fffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:26 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) [ 2923.888089][T30246] loop1: detected capacity change from 0 to 264192 00:55:27 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) 00:55:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2924.133740][T30253] loop4: detected capacity change from 0 to 264192 00:55:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 00:55:27 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:27 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:27 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:34 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2931.212288][T30271] loop1: detected capacity change from 0 to 264192 [ 2931.219201][T30272] loop4: detected capacity change from 0 to 264192 00:55:34 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:34 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:35 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2932.291989][T30291] loop1: detected capacity change from 0 to 264192 00:55:43 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2940.404646][T30301] loop5: detected capacity change from 0 to 264192 [ 2940.414101][T30306] loop1: detected capacity change from 0 to 264192 00:55:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 2941.266219][T30318] loop4: detected capacity change from 0 to 264192 00:55:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2941.491145][T30324] loop1: detected capacity change from 0 to 264192 00:55:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:50 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:50 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2947.518469][T30337] loop5: detected capacity change from 0 to 264192 [ 2947.525548][T30339] loop1: detected capacity change from 0 to 264192 [ 2947.535564][T30336] loop4: detected capacity change from 0 to 264192 00:55:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2948.728239][T30351] loop1: detected capacity change from 0 to 264192 00:55:52 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0x0, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:52 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0x0, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2950.186081][T30359] loop1: detected capacity change from 0 to 264192 00:55:59 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:59 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0x0, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:55:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:55:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2956.720300][T30370] loop1: detected capacity change from 0 to 264192 [ 2956.738783][T30371] loop4: detected capacity change from 0 to 264192 [ 2956.746228][T30368] loop5: detected capacity change from 0 to 264192 00:56:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2958.045460][T30387] loop1: detected capacity change from 0 to 264192 00:56:01 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:01 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x0, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:02 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x0, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:06 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x0, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:06 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x0, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:06 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2963.916477][T30399] loop4: detected capacity change from 0 to 264192 [ 2963.917853][T30403] loop1: detected capacity change from 0 to 264192 [ 2963.934343][T30401] loop5: detected capacity change from 0 to 264192 00:56:07 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:07 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:08 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2965.397923][T30423] loop1: detected capacity change from 0 to 264192 00:56:08 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) 00:56:09 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) 00:56:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) 00:56:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2973.202451][T30439] loop1: detected capacity change from 0 to 264192 [ 2973.240126][T30438] loop4: detected capacity change from 0 to 264192 00:56:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) 00:56:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) 00:56:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) 00:56:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) 00:56:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x17b00) 00:56:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:23 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:23 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2980.324412][T30471] loop1: detected capacity change from 0 to 264192 [ 2980.333820][T30473] loop4: detected capacity change from 0 to 264192 00:56:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:23 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:24 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 2982.009221][T30487] loop5: detected capacity change from 0 to 264192 00:56:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:32 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:32 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2989.513549][T30495] loop5: detected capacity change from 0 to 264192 [ 2989.535019][T30497] loop1: detected capacity change from 0 to 264192 00:56:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:33 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 2989.943648][T30511] loop4: detected capacity change from 0 to 264192 00:56:33 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2990.877965][T30518] loop1: detected capacity change from 0 to 264192 00:56:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:38 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:38 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:38 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 2995.957029][T30536] loop1: detected capacity change from 0 to 264192 [ 2995.957670][T30528] loop4: detected capacity change from 0 to 264192 [ 2995.974847][T30537] loop5: detected capacity change from 0 to 264192 00:56:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:39 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:46 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:46 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:46 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3003.119702][T30566] loop1: detected capacity change from 0 to 264192 [ 3003.128819][T30565] loop5: detected capacity change from 0 to 264192 [ 3003.129028][T30564] loop4: detected capacity change from 0 to 264192 00:56:46 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:46 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:46 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:47 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:47 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3005.065214][T30588] loop1: detected capacity change from 0 to 264192 00:56:53 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:56:53 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:53 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0x0, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:53 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 3010.260828][T30599] loop1: detected capacity change from 0 to 264192 00:56:53 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:56:53 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3010.671620][T30607] loop4: detected capacity change from 0 to 264192 [ 3010.761307][T30612] loop5: detected capacity change from 0 to 264192 00:56:54 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:54 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:56:54 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:04 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:57:04 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:04 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:04 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3021.675329][T30629] loop5: detected capacity change from 0 to 264192 [ 3021.683093][T30632] loop4: detected capacity change from 0 to 264192 [ 3021.685305][T30626] loop1: detected capacity change from 0 to 264192 00:57:05 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:05 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x0, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3023.131860][T30646] loop1: detected capacity change from 0 to 264192 00:57:06 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 3023.228774][T30646] FAT-fs (loop1): Unrecognized mount option "ç" or missing value 00:57:07 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x0, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3024.229252][T30654] loop1: detected capacity change from 0 to 264192 00:57:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:57:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x0, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:13 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x0, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:13 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x0, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3030.882815][T30664] loop5: detected capacity change from 0 to 264192 [ 3030.888894][T30667] loop1: detected capacity change from 0 to 264192 [ 3030.899242][T30662] loop4: detected capacity change from 0 to 264192 00:57:14 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:14 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:14 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:15 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x0, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3032.733336][T30686] loop1: detected capacity change from 0 to 264192 00:57:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:57:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x0, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x0, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 3034.095302][T30697] loop4: detected capacity change from 0 to 264192 [ 3034.152669][T30701] loop1: detected capacity change from 0 to 264192 00:57:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:28 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:57:28 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x0, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:28 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:28 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 3045.194622][T30724] loop1: detected capacity change from 0 to 264192 [ 3045.204288][T30725] loop5: detected capacity change from 0 to 264192 00:57:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:57:36 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:36 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:36 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x0, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 00:57:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 00:57:36 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:36 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 3053.743913][T30760] loop1: detected capacity change from 0 to 264192 [ 3053.760306][T30758] loop5: detected capacity change from 0 to 264192 00:57:36 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 3053.832711][T30770] loop4: detected capacity change from 0 to 264192 00:57:36 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(0x0, 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:37 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:43 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:57:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(0x0, 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 00:57:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x0, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(0x0, 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 3060.965993][T30793] loop1: detected capacity change from 0 to 264192 [ 3060.976606][T30792] loop5: detected capacity change from 0 to 264192 [ 3060.995181][T30789] loop4: detected capacity change from 0 to 264192 00:57:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:57:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x17b00) 00:57:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x17b00) 00:57:51 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:57:51 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x17b00) 00:57:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x17b00) 00:57:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x0, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x0, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x0, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x17b00) 00:57:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x0, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:57:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x17b00) [ 3068.154841][T30825] loop1: detected capacity change from 0 to 264192 [ 3068.169011][T30826] loop5: detected capacity change from 0 to 264192 00:57:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x17b00) [ 3068.246283][T30836] loop4: detected capacity change from 0 to 264192 00:57:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x0) 00:57:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x0) 00:58:00 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:58:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x0) 00:58:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x0, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x0, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x0, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:00 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 00:58:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x17b00) [ 3077.364343][T30860] loop1: detected capacity change from 0 to 264192 [ 3077.373427][T30858] loop4: detected capacity change from 0 to 264192 00:58:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 00:58:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 3077.625093][T30871] loop5: detected capacity change from 0 to 264192 [ 3077.712163][T30873] loop2: detected capacity change from 0 to 264192 00:58:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x0, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3078.750335][T30877] loop1: detected capacity change from 0 to 264192 00:58:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 3078.826162][T30879] loop5: detected capacity change from 0 to 264192 [ 3078.918965][T30883] loop2: detected capacity change from 0 to 264192 00:58:09 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:58:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x0, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 00:58:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 00:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3086.561926][T30897] loop4: detected capacity change from 0 to 264192 [ 3086.563314][T30894] loop2: detected capacity change from 0 to 264192 [ 3086.570657][T30896] loop1: detected capacity change from 0 to 264192 [ 3086.575713][T30893] loop5: detected capacity change from 0 to 264192 00:58:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3087.569700][T30908] loop2: detected capacity change from 0 to 264192 00:58:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x0, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3087.935124][T30914] loop1: detected capacity change from 0 to 264192 00:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x0, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 3088.985832][T30919] loop2: detected capacity change from 0 to 264192 [ 3088.993230][T30920] loop4: detected capacity change from 0 to 264192 00:58:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3089.179846][T30924] loop5: detected capacity change from 0 to 264192 00:58:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:58:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x0, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x0, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x0, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:20 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x0) [ 3097.787808][T30936] loop2: detected capacity change from 0 to 264192 [ 3097.793961][T30934] loop5: detected capacity change from 0 to 264192 [ 3097.797702][T30937] loop1: detected capacity change from 0 to 264192 00:58:21 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3098.794823][T30947] loop4: detected capacity change from 0 to 264192 00:58:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x0, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3099.264272][T30950] loop1: detected capacity change from 0 to 264192 00:58:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x0, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x0, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3100.123852][T30953] loop5: detected capacity change from 0 to 264192 [ 3100.218942][T30955] loop1: detected capacity change from 0 to 264192 00:58:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:23 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3100.721779][T30960] loop2: detected capacity change from 0 to 264192 [ 3100.809058][T30962] loop4: detected capacity change from 0 to 264192 00:58:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:58:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x0, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x0, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) sendfile(r0, r1, 0x0, 0xf03b2900) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000000000004) 00:58:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) sendfile(r0, r1, 0x0, 0xf03b2900) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000000000004) 00:58:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3109.122924][T30971] loop4: detected capacity change from 0 to 264192 [ 3109.132510][T30973] loop1: detected capacity change from 0 to 264192 00:58:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3110.068871][T30984] loop5: detected capacity change from 0 to 264192 [ 3110.144295][T30986] loop2: detected capacity change from 0 to 264192 00:58:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x0, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x0, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3110.561473][T30990] loop5: detected capacity change from 0 to 264192 [ 3110.568974][T30992] loop1: detected capacity change from 0 to 264192 00:58:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3111.159196][T30996] loop2: detected capacity change from 0 to 264192 00:58:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x0, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3112.273309][T30999] loop1: detected capacity change from 0 to 264192 00:58:42 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:58:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x0, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x0, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x0, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x0, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3119.729761][T31008] loop5: detected capacity change from 0 to 264192 [ 3119.739802][T31012] loop2: detected capacity change from 0 to 264192 [ 3119.749363][T31010] loop1: detected capacity change from 0 to 264192 [ 3119.749550][T31009] loop4: detected capacity change from 0 to 264192 00:58:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3120.762491][T31028] loop2: detected capacity change from 0 to 264192 00:58:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x0, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3121.451542][T31031] loop1: detected capacity change from 0 to 264192 00:58:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3121.631063][T31035] loop2: detected capacity change from 0 to 264192 00:58:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x0, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3122.606885][T31038] loop2: detected capacity change from 0 to 264192 [ 3122.638819][T31040] loop5: detected capacity change from 0 to 264192 00:58:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x0, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:49 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:58:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x0, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x0, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3126.878490][T31055] loop4: detected capacity change from 0 to 264192 [ 3126.879500][T31053] loop5: detected capacity change from 0 to 264192 [ 3126.885751][T31051] loop2: detected capacity change from 0 to 264192 [ 3126.892635][T31054] loop1: detected capacity change from 0 to 264192 00:58:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3127.134911][T31063] loop2: detected capacity change from 0 to 264192 00:58:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3127.435950][T31066] loop2: detected capacity change from 0 to 264192 00:58:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3127.599767][T31068] loop2: detected capacity change from 0 to 264192 00:58:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:58:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3128.020369][T31071] loop5: detected capacity change from 0 to 264192 [ 3128.127282][T31073] loop1: detected capacity change from 0 to 264192 00:58:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3128.558572][T31078] loop2: detected capacity change from 0 to 264192 00:59:00 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:59:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x0, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3137.383752][T31086] loop1: detected capacity change from 0 to 264192 [ 3137.389727][T31091] loop2: detected capacity change from 0 to 264192 [ 3137.394734][T31092] loop4: detected capacity change from 0 to 264192 [ 3137.402250][T31093] loop5: detected capacity change from 0 to 264192 00:59:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) [ 3138.387199][T31106] loop2: detected capacity change from 0 to 264192 00:59:01 executing program 5: unshare(0xc060000) mq_open(&(0x7f0000000000)='^\x00', 0x40, 0x0, &(0x7f0000000040)={0x0, 0x3ff, 0xffff}) 00:59:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000007000)={0x7ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x53c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x1f8, 0x12, 0x0, 0x1, [@NL80211_ATTR_BSSID={0xa, 0xf5, @from_mac=@device_b}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6}, @NL80211_ATTR_IE={0x62, 0x2a, [@channel_switch={0x25, 0x3}, @mesh_chsw={0x76, 0x6}, @ht={0x2d, 0x1a}, @gcr_ga={0xbd, 0x6, @device_b}, @cf={0x4, 0x6}, @rann={0x7e, 0x15, {{}, 0x0, 0x0, @device_b}}, @ext_channel_switch={0x3c, 0x4}, @mesh_id={0x72, 0x6}]}, @NL80211_ATTR_BSSID={0xa, 0xf5, @random="8457c9c99dc2"}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_SCAN_SUPP_RATES={0x13c, 0x7d, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xb9, 0x1, "edbe19dc645e34941318145409da29ce7fcef9485229d9572737fd3947ffe224aca8a18103bdd7b7680f68eaf352c04f66b869b6680391de920a2ee135dacf9b317feeb4621fec366ae50ae8bf553cdc8929fd4bfe22d139c80903bae782e17247bb2f342c925eca1c33d8588ff66a6614f2e727ba99a613e4d9901b6395d28b4bab74cfb1fce8cdc395b71b37e0938c569c29d2db3c866b0832c1abb5f969331fcf8f6811367315fbe2ee580fe538cafbe5cc301d"}, @NL80211_BAND_60GHZ={0x79, 0x2, "a8dfb58f89b186ba2c667008892115705f43ae81eb65a0806520f65c33a7c8966d231dd30fff0383272bffefe8a0960128e5655e8d9ee6932cf838ac862eb6cc17a60504de7cc5312c858e6196dc502190b3d940fc945cf212da27f3ce13cb704fcd9ac0a6823248fa4c237bb2a7066e66280aa8d8"}]}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_BSSID={0xa, 0xf5, @from_mac}]}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x10c, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_WAKE_MASK={0x9, 0xb, "5ce9d70269"}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0xc5, 0xa, "6596bfd1df866d7bef8dec26195022938d36aa367af748a9373f8f35a7db88ef6904629e914f7e2eb16ec7a1015a0028f2094f3807df350b387b29507404d18c0789c6b4b2532c1af0598b08da65c52c9abd8e1f60019530742b445fa569ca23837e61cc7dfe56490865c723974e19b89f9d0d9982895924ed82fa07f5e090f23c26e0b562c3704cd3c56ea9351e46198a81e462a188c1571231c7b2008d7736d227ff409be00125f69bf0c67b0717df0b19d8f4215edfe50032a3c1b500707f21"}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @empty}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10}, @NL80211_WOWLAN_TCP_DST_IPV4={0x8, 0x2, @loopback}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x9, 0xa, "e95dd8d932"}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @broadcast}]}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x228, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0xd9, 0x8, {0x0, 0x0, "4abba7905b7b3706fcac95a2f58c2e0ffdf24bc3de81608b7e81886b85e1b0b2609f4221143ae6b7d19fdf3139c2cf6de2138eb4d86b3f0a11b15f8c1590083356369dfb8a3c0ed446ee0ba826f90f5c4e1cece9d2f7989e842ab4f88575f47c572fc4ea738a435a3fe6143358c8aacb18ba62b0f15ae3d0d4d77ea125d82583f7c8bf8172fe12529df21f49e88292ffb5e4fce1bf300135719a661c2d9d6d8d872fd1c47ac7e2e464b49ca720506f8ad77c551d2dec10a10120893838d0dfca4ba0b308e1ab5da327e905114d"}}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @local}, @NL80211_WOWLAN_TCP_WAKE_MASK={0x71, 0xb, "aebcb2de34d33deed6dda767f3ed5a7671adef62b756f85e011652c4d722aa32a7ce4a9bcbae4ff6b793e5c1c9656684484e6f9c5e537d04a1dd7ff6eaae021bfccb0035062eee2ab427131704612ea11ca69ca292c4dce82d8fcb14b85c16574d4239d96fb3673c499616b14a"}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0xc9, 0x8, {0x0, 0x0, "eb2e9475fee93a43053af58a26d42f602ff0ce1e2cbbe6646cc5fb7aad5fa185a583d6f65b3ae05b630bf182d5da241086805ae45dfe21193386448a1adb64a6d19c159c835940edd646855c9bf3ffb9c71ec2cde1b9cc8f772e44eb6562c68019a6769978f09f9fed6b46a5b03f0eba0bc192f4cd4d46a8a9e9719e99c9079e68d4bdbfce838fd08f1a8682025591a410367e0af0669bf0ef6355dd391aec9a1251ae14595246bed9092e31cff0fb9f5405ae2f9cfe5110acb70465e3"}}]}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0xc, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0xc, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x29c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x158, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_SSIDS={0x90, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xd, 0x0, @random="21879a8008a75c9be6"}, {0x19, 0x0, @random="a7acb34b4c3ed3be685243d96fc89433cf4bfc9487"}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}]}, @NL80211_ATTR_BSSID={0xa, 0xf5, @from_mac=@device_b}, @NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_SCAN_SUPP_RATES={0xa4, 0x7d, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x51, 0x1, "177988bdafdfe4e615ec950dc71ba8fcc33b8be85087ea67bd74b37f718fbf1bbbf39cbcadd1ada30c922037606ab6453942edb794ba62c138ecd5a764ecc519cf32f07933d724e5797b3db15a"}, @NL80211_BAND_2GHZ={0x1d, 0x0, "dd4b6bbab2e68e23d1d7a29d39e2c5e2961c5aa609c94fadb2"}, @NL80211_BAND_2GHZ={0x29, 0x0, "2ce379dc35cbcc1d9a82fd54a7331afc19ff1144dc011c6a10b3e0da5aceb3e3693afc348c"}]}]}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x138, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10}, @NL80211_WOWLAN_TCP_DST_IPV4={0x8, 0x2, @multicast2}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @multicast2}, @NL80211_WOWLAN_TCP_DST_PORT={0x6}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @loopback}, @NL80211_WOWLAN_TCP_DST_MAC={0xa, 0x3, @device_b}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD={0xd5, 0x6, "1d7dafd9ac7c938db75b82ca24f19e9843303ac844140daf404d5f32169fa032baed9c87eb17b4a056b7141cb7aef35684cb937b85c55eafae8fafa2aa9c096ed13b31fc39298c7594cf326aca0e41aa85f46a19b2c7c1e65a4363f6ae71946ba7ee9a0a393e41b61d3e5759a4f3ca86d51815264b0ca4b93e11071e10a2adb0377e918e3588128bf6a4b12f24972fb9511eae41e1da522d16c7b746bd93d742bdd9378df4c138ee9f2344a004757dd7a47ae5ec38c6a935b458b9085a4e9c6cd3f2c0f787f1dfc860bc67552b2e81926b"}]}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x4094, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x1278, 0x4, 0x0, 0x1, [{0x178, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x81, 0x1, "7f499906b29b902306d3fe3561ad54ac0de7888fdb0af913ee9128b1c76b3ca09086d0f3b21b4428c186a67f5eac2a4fbd5ab9c803d8b02a52b1e178041f86acff84990d718c5dde5f249738fe7d56eb96c0ded2a0964314b1b0014ecdf6140347b48b73af6c7cdd06dc1e49e452ccf0896ada7f0648d48801023f2731"}, @NL80211_PKTPAT_PATTERN={0xed, 0x2, "beb245dd59124d41af775783bc21b86b430524f5574061fe5a416b9a40ca7b0b2f7678bcbd806214116291760427bc1e8cad1f6edc5fd38ad1f1200844f140da505bbf76c5e2d9e63a5f6dc0d58bf5011557e7f52e41c86f73c94f4ccef6c3530f7a4b5e110e89452a9b927d79034c2ba060148803168180d8b022c9c2e1dee4598f63795d6a1a686381f435f5fdd913b679493b729d1798f6cded8f99bbd536bf25aa324d8cc0280fc8b688c893ebf3c756540b073da45cec1f76ce05b3064ca63e438820e9fbdce859e861c543689770a942147c9d3010a52dd3a41c1dcdac0c2e90af2c1f4d9ac7"}]}, {0x10fc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x45, 0x2, "3b83ea1020c3321e9414f714d6613556c6d16c13d28f18416f338c146a5afa11c140983342eafe42e7161bf294d49801dd6a6c2c7d9c977af30880c445aa27888e"}, @NL80211_PKTPAT_MASK={0x1001, 0x1, "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"}, @NL80211_PKTPAT_PATTERN={0xa9, 0x2, "19a8c5b65236192db2f20d43ea15e38a34e0ba9b1b5412ffd8b1212f793ea58064514ad89d72e7c7b1b6c5b73fa3e2c4d7c1e5bef5fb7ca9c667627dfa856182b387b85d85eafe0b348c161c6db7cf3d334e3829ff622f50f9d06cf9a86b9759d646f51829288016424cc585bcbae04360b658823aef3e6841d7fcef42a4d6e8f6c69428a5d9799ceb2987d7ca247444ddce443b7e641d46d1e1f7051d8a476fa2101f5538"}]}]}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x2d60, 0x4, 0x0, 0x1, [{0x124, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xd, 0x1, "5bb6183f71f2ef4f0e"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x51, 0x2, "31dc27ace8c00e89a667f9a24f5cfb8e9c34c3c159e142e989869ace1e943466d87f2c1b525a46e5b4080e84b6ebcb918642a488c1c88132903e65291908dd52fa89f7cd7bc1419617ee44beb1"}, @NL80211_PKTPAT_PATTERN={0x2d, 0x2, "21bf86118698c3c731e767db15bec5421be061ccd65d587158201cea1ab26fa82653133409d6517209"}, @NL80211_PKTPAT_MASK={0x81, 0x1, "edd2d8c0bcd7a80d47f780b381597db1a801be40184f6f4334a786028cba18dcf85367989d4985e3b016579f4999d47c74043879b79b8d675f3368bdb20851e2ea1ee30e6f71420d8d4c738f2c5250ba540d051cff5ada21cd2f9aa177e6cffaddceccf6556e44c96ee4baeaba65b14c3621e53e781ae0eac84f817e2d"}]}, {0x164, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x2d, 0x1, "b8b92177e8cafbe4a6a219e1be37930cd4ad2af6cb70e1844e09a201e129054102ced00a301838d2cf"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xd, 0x2, "88ccf5e2381a9f45ff"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x89, 0x2, "1a5dc8b6bc72a183d00fdf08fb879d0e6896aa7a9eef7b6ea5e0526ae48143959bf8e687eb1923a18309f822e3aea0c4e604a7ed8b987cd83a4f9cad90b080b3df70918d15c499f8d0db2a2cffa4a90a2d4fdcec68a788d83c5d3f9551263a6c9bf7b120efea12bb201b38f350ee1fabfa2add28114ac09aacb92bb4800b4ede7116a7c672"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x2d, 0x2, "250ccf9b136cf455f0b478f9e22dbbbfb6d3bf1515a6d25d141546c846fa84c5924050e3d0eefe8456"}, @NL80211_PKTPAT_MASK={0x41, 0x1, "022f399df5c6f85147c2b6cba6ef5261de7cf0cff54e90ae5d984145b2f4be2019ccf8ee453501ddeecebdf20da7edbcad70129def3234b5b5f1c1c107"}]}, {0x4}, {0xc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}]}, {0x320, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_PATTERN={0x21, 0x2, "ed4d95452f75be122da21beb161182fbc511ef653e14ac985085b96479"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xc9, 0x2, "cf4f379239783359befd2b750d8fa06c48e00576e08aa84e4589c472f2efcde8bba4396f7571492429e7a865610ce5b8e122c7df68d2d3ea7009cb741b0536dd5d81ca8ef7c085ebfb1900a6024ad27d07a278b8b7da02f5da3b646ee5ac4171c9f4edf1b07dbb221eea3b7dc81ef7b44833f85438b73c9253dfb4e00f233fb8d864cecf0a09995fcf5ed43e6cacc84c259082c1fb5d972a4d61aabaafb442fa94ba27832b0e9e0be21b796c73b99c56486d7c16c7490bb821859f506f516d37961b797a28"}, @NL80211_PKTPAT_MASK={0xa9, 0x1, "2eb4f635b1c8ff6f16b4ed3d6e7054c2b1cd8b3f8fe30a76271e65ce18ff494e34c68c6167e919be6958d45a78499c798d33bed403bfc53590af022ea6c99d73bebc5d908dd552f0012ef0cb6080fb85ec989cf4e5ef6e0c8a04463ec0f769534559b169ff3ad5675cf9343e4d882c6f592ec86781e6ade40fbf5f82ece206c4b8b3c68dde35a9fe884e9bb09411d1822d77d221b0aca50894c76a9d6214a1cc2441929803"}, @NL80211_PKTPAT_MASK={0xad, 0x1, "0d30a55b98011148a367def27e16e04edc147960993bd8bfc426423fe5b1d00bda73d364f80dbb175c45ab143e0e87bc361dfdbd26a40932af0cb309b1e6cd55dea2308e124517b16c8f36c2104c0e9df871686f3e6dd5c3004925293967b9b9fa7ddf487bf77576ad0058b752d0f531dd0d64bfe5710f66cc8442d7c99641ea5ebc5e344b2c229449547591067a16c9e6f8687bd12e43247f950bfe662c76b4dd0e32159232616152"}, @NL80211_PKTPAT_PATTERN={0x1d, 0x2, "1316812fe7e726e67e308b0c5c59204a76b37f0a97f56045c8"}, @NL80211_PKTPAT_MASK={0x4d, 0x1, "5e7252f9207df41392412d0fef5299fa0d9fecfae05f16808216c4706e2232e20d98db0a1e61229abfb327268d30b1e30cf462d40690990cfd37d173d7fa3287c892b69606677db9f2"}, @NL80211_PKTPAT_MASK={0x51, 0x1, "58a8889566d01835418eb53a006b9dcb25da1ad6afca8bc2bad5fe63ef400361f89b8ce26a6816d2279dfe63866d09ec3f191ff9ad0afa5fe464e36f7a4cde617dac5278927d25ae27ce182f32"}]}, {0x368, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x31, 0x1, "c25415eafa439287c71373276ca320f3086ee667a12305d729d1eee7836b02c66a3cda1232374e8548d7cc3e66"}, @NL80211_PKTPAT_PATTERN={0xed, 0x2, "569f6091d843472996121ae2400cef599b87846b44e1b4726676613b01347abfee6275fdcd3e5e81c1adb194409ef34da5d6bbee73aeb0b3e79600f24580019c29b368896e9f1b74100feb16606f5022ad6d18d78f0bf9bf8ea4a296331735f722cdebcc284bea4a75fc71a7da33f367c5151be205609645217450172b5584b1833c3aae4c4e1a97a6137638b4c34e074e6036ab9c03269dac73677b07f8b6aaa1c30c3c5806acfbaed58825e7c52518161ce575b7fabe529ec7c25762855a9bbb75f60debb46b3dead56a0efee103dea0fceb33b45ab05ba0dfb24400629ca631608f44eeb87c5a1b"}, @NL80211_PKTPAT_PATTERN={0xc9, 0x2, "36663c160698effa39887a89e8b02ba9b7f58744a20266226522499a6ea9e7d47fa80cd0b9bdd6976bd23510012136a9eb4351b5f01a3eebb939049875651dabc0aa49f961f3cb1522429bbab5bc349e3f37c0a2f1d5327da1ff5871f6b67a38e67e1ca0007cc6f4e1e152cdcd6935c4ee48be7632e03dbf30aff28d38806ed64cf6641dac3013f07ea641547e52d9170f3c60fa7329874e833f6ac550915070371b0d63ce9cad6a83e55ae7a55b9f296a550dbf9de550d49af4acb8dcc29e049713cdf113"}, @NL80211_PKTPAT_PATTERN={0x21, 0x2, "194dedabccb3ebdc35b4b1bd080f081cb487aaf363fe8c74bbcca07f79"}, @NL80211_PKTPAT_PATTERN={0x19, 0x2, "c1e27ee5731676de16334066fd9fccec72af57cf4e"}, @NL80211_PKTPAT_PATTERN={0x61, 0x2, "a0fc9ae530134611657d54dea803c7684a2dd8fc3088046a5029353b95551c61f8c1b690cb9d501453c50659bfe81f0b44b4be70ffb67921943b32f4271f6c3a996bf5d59199307ccdf592805f1cadeded0bbae71603ff09cb142c8ed5"}, @NL80211_PKTPAT_PATTERN={0xcd, 0x2, "bfc263ca978fe1d621ed422768f1ba30322a73e898569ffa31e36d4c27e2e3d41a35c29f6dddc485be4534a22429950683ea10ad5bbf8840c9bf6b627a44b9f9a5bb29d8dfac9981e455ab0a52c8b801f960067e2c8af36acd0ce2b0fe908ad0c05eb83c88a6a327249213801202c6afb84b727bd5250d203b5ea0650be72e124bdb8e5373b4f5b140675c71cd2e3b27b3c5081b92e77df1e50ee9eb07c1ab0944795b527d240bde94fda94075bde20f9c2ad299af2d3fab412e5d6224c024e5e7e4f3425426944439"}]}, {0x1168, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x1001, 0x2, "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"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xd5, 0x2, "3ae2871cf882068ae5cdd286e59ab515183a94c81fe2647bbb0ac917dfb2c5e1ef3aebed139bb2224c520bf8b237d19d080a229f9d4234c764386616c12913a1eb96707ffc177df5a38e747773805e5e8ef73c516a3f64c80657a9a73fe7af65d486fd59fbadc537e3daaa72e412eeb809792ba8af01854ef10a722caa3363024503dc2c320ed5b1566876d4f6521b7ff0ad2d943b5c600582345885849c08d47bc8cad61b5a53b789aa317e070e7452ea4a624f85e73206a367dfd7f91524d6e6a423dd8f5ebbc6d38e74895f910d8a16"}, @NL80211_PKTPAT_MASK={0x7d, 0x1, "26d06a8e27539b53e64ee757edcd2a9097d78f7614bb262128976d44ad7c14341d68f4e312b0d20fc77dce3e23237c0b4d86d2c80959509220d88353d3f30016e77e8b4111a406586ff3b89a79417ff33ca942326d4d9a8eb8f298f10086dc59151165bfd8f7abf27c45384560d0d824198e380269fdb1e495"}]}, {0x4}, {0x12d0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x1001, 0x1, "0e657936e9bb269192230d1c6009e5ccefdc4a3f685e04c3e6865c99cbad0b14d70d541c2b3febd5314ff06ce59fda7410a13b1213a64efeecb3bb0eeb83a83b13fe124c96cecf3a76fdfb45a389b7e831887196b271157906f8f786646c7bca7a3fe4f5b1e0f44abf3d47356302945638dff5713143701ed5e512a7f08aceb3a30a0627ad1b5c383b76b9596272fe98074356fcfc4cdffa3d1f95235790f8c37ab9049459654ae20a1c24b8c36cd9bc4036fb319dc8b86abd68ef53fa07ae6cffc22a0e94d5e25ddbd108e1e1c894e31647b2fc0c5b1828856df0023e209a28608515608a577921998c506b96b8f5d0f91165b85aa0e2a63cf1bfa3cfebc71d08e532700af64db121f543b7fce384a2be2d47deb2a4c5f0a971d6d3fd4f43d0ba0377fc62b5b010bc99be2e37d4b82eb4745089e4907852ebf379030dd1364af40cb9b908b635c3756034196c7a7ae58d7e3e76159c2579e1b6e5aaab7710b4422c3537ce954cbfebea0ae53f6de6a7732a406a44a3eb67776a70aa38a90670826aeeca2387abe7f2cc372d27e138fc47de67662d304fb4bdc012c12ede3ac96f239eaab485f61078452e0a7542db5a13ffa1379bfdcd29b90431498ea911fc99cf94b6f771572df41df9fcde11b973f70c47c68bbba64deb0224a434c7167c3a0315dc8ca433a89e9a28172467b7076d0d022a94a7c06d04ac3c237a5e35c40f1d34e1c4a827b56e454a0f35f0c44a71dbd83286f174d9f3329949106bd73d3c386ec7d1ee4d082216be7062b642dcc1ba8a545677c716cf94916a21b31af074144529adfe1eb15454f02ae8a3bd22f95d8bc939e850446c7746ff637a70894a07b427323b2eb79cefd245b49043ff908d6c9d95d25933464884d6934b81bdb5c8476ca930781cb667d65649121e1611be7d01717285979aaeda23b1d01c4cfa5a2bfd34fc6ac6b2b805b64be5c76b51e0ba501cc9fffc0870cc9276f00d569af7f553178f488c67013a954c22ff49dc8f41c5fa688f2c1206c4e987adc45c7dfd33f4e2e7f3e1c3a55c871633601ec0910011286b9e70c834bd80a71c2b31c172a25c90de8acb8a2964ff8f541a76fa0a4ed2aa7d13e41d5d994516e35cc40d9bea6d08694e50aafc137a11a54eee85ee347b22e917d3751318fd90fcdfa261d71a14accf9961a220ff282216841302dacd9fca90a45ba213f7c016afc0c5072bce95c0879a7239af2f42e3e81d2eb792e566ccf82cd72872c3d095f860fe02078ace5346e315cc0476bcaa4b79353205512cfc228264102f6be428805c1222ca7785b7a635fbf7cec8469d2cb5a9ca39d1409a59764c7c9763b02d5b990998871889e66888ebe713550b005d988081da623af603f7bff6d8ab723e529382b4ca5a644da54f82f84a34eccbbfa90c3be4646025329bb0a1d6678a6550fdcf425e3bb4971f7c17b6f63e33c283773e3163a93d5a5d0844d0bb73f3a9a051b4458ec1464301aa0801175a7856d05754d054627528aeb63a52cfa04842282189f19acbc01f5692b66d9e2a3d6448044cb06402afbb6c3d9e0ddf437a8658da943137bc9248f14512a0ed232db0dbfa31a1e05e548734618da4d2f83fadba2559672659b75519014fede7e22587d7d422b88c5ce0461a5cb2a95e6e976fc43ced4a772eff2a1bd3d7b9005a5387e5a25670ad94b16d08eba1733ece2cc10db600b07e61047cc811133c4edd1840705a2a970425ae5b3f9bce336ce9e956821a4d48c8460b6a6f20ad27cc2ef5845c68a44031cbcbd6d33dea30d36de5bde70ba46666e2985d8ff84d69a78cb2702cbb4eb0fdae577e971b85878289b524cfda113627b6c1cda2e970450a50bf15a9ea2d438654bbaed32ebd0fc600e2251b2dd4510349455c1b907ae0af56b67ca247e11af2acf42cbec75aea2b1ed25a8f7ac5be52c1938e4538c7c871ded3cfa1ced49e7f0a660f5cd662703a323a110d9f07cd8c4d67bed5850b89b84d0ae4fca9aa489ba27ca06cec776306e47322667a36fad3a008b0df7bffd3a98691aef4d83fc81817f98fce7675ebb1c1700347abaa823e435439077b2451a280b114de3c6d9296e42dfca89f3985ff1f7211a16e5d3221d278f43f5468d3aa289334d0b74d539af4432decd330dd92b15675e16f8a6fb8b783720cce35b9f91a0a127391d5de38a77cf2d3dc74e5cd58ba0d0a3654d6c88694bf07820398dd8d8a12bc505bec9861adc4c462e048f07c8f11a92b9ef79deaa161fd55270843b3cca1cf2768b9b6646e77f8cc3251483abc0679728a3f56a64413a8d67d51285ee156d2cdac28688f1bf0968908833b6487732055146260c54e68ba64d879cbb2890a6861705c2f0175167510d8da2900903305859b45135cc2d233225a158d4448bc26b22a9afc825c75ed7e88de16240cea8888097684aa60ead4e117620ede714cfd784d8ae092ca899a941ff74ae12d6c3937a393eb4d3946fef88d216825a649e5c327e98e02199251f2fec64142975871be02c482991f5e01c38c3037e6383c1837df380469258c5dad41738725db18c87342543f3c244503e718c3c2e5992a6834ce58fb76e2d35bd5b66f81c6e40c2c09982332a3cb1ce4728aac77e501ec7a4d6bd0c369c1749ee886fb752970b3ad748dcf9c4fc2fe6f4635d9defaaae8c2c72287edad25db2f2d5dffdbdd82b030e303d4df295dbdda06ce12d4fa7a315e4d999ab61b74219778739e7aadd8a4373db373a6745e91a6f0f18731df7d327ae7a08df2078880998e0c8534609ed836ec717d5c9010a1adb446fabde9f3adb85d278981eababcc13752529548ef7feb0546d9d84851a00ea61dd84454c52a15e4803e3667eea633755b9305dc470cc41cbdfa8a97b2f90e51c5a74cd2f08c30b0861adb7b28eed476af3ef1a8e980e8c2ba1d7c59a22c0781ffe4f33939b9543505d8386c39cce43d6c17e234f63a99c566f02b736b2128c3a9609715fbb5c47a5d331876d1b8f014501d5ecd5be25b04bd238846dbcd43d4a17f15803be3458352c677184196dae42b02329808b51f169eea0d826d2c5e32c53b8c65ef3e018bd09b358ced2120ba4fbf8f630c235cfd453785587c7177bf80b752464fa7cba0f669d814ec575dd94139c1ede5f6a40426f634371b315617df35e315b671a5e314d90d7780a72bb638825f455d1303cdbf874ecf53742199b11e041e5358e15b6175db4e5ec6b1e78046d8d487cbafb02a939af83a21c88d8be9d74e986dbfefb7ba7de70ca077962fdbcb59bd79153a270ac53b66fdcfecd9bd1c63f4e7f9354d9bb047e23dc1277949c521a572f1f7c9f12572b337c5725ed53c897edcfdc1aff5f24406bd13268aeaa22f6d6c73c63edfcc37d4d27c7d458803960a731a3a3dc18dadd3397b854729a4f098035687d791029b5d457df2a8eee8cbc371e9ed6e9961ef55c90114a2470271721c489aaf023f01a8d293aa67c6a5904f8671c8ce08a047cd1b5afdbaf5e0c2fafc1b597092b89a135c9d93b320336cd6a7bec78b14a459124a5eb416bb1265c6e754a9b7f3026a355baefac80c7cda76bb609c6776a3c2f0eaed94382bcbddc28b9595cf07ea3ae005b6a26eb225560702b2503d1d9b2379d4afd512bf497626cf59316c134a8d89ba55be91edc5bf0675d63cc3a8f57ff82734223e6e060ce3e0ec3f0f26e301e7f1e3dfffbe9e8b4bbb577136ff591418e7ad200564b2849542f9bbbc3a8ca53d150ed8ced6bd93bc9e1dfae11a5bf525a9492bbb3730ec17f236d558b91a30dadabb7a693b62dda9ed395c600ffe3b684283ea0a8b23df055d3650de9a0dcd107e8cab743a5cfd263696a5cdc77911ba99e6e4c8c5940073ab8b2fec564f7c1511effb7ccf761ba5407f6e1fe7abfa30ee40c996e5b93c21f6be5cb198961185707d24f0a32101a3c7732445ed80f08c5515fdba586f89fed2b8a5d3edcf203467a96d4c8a721a858e2b8cfea81cd6913edef8db309f0b4cac07d9467254b654cfeb8f0af6d400e7cbb36e0b7a8acb35b4708d40f13223d20a4296c4127749f419c0e540438d5964c43c4eb5eb7442c799d86325d8932556fb6c8205d0f89336e0743809ddb24af15531b07539219946b5ac3eb49a2f7a0cd1d84405a756c1f2f59522e9d89b25d4102883700800fd6d9b0134c42f5c08509ae4024e8682b1732db4e2bf4714a2bb031fe645d1de148a23a416951769ca6a9afdd58599ff4de436162c6ccb5c9f748ee5c9f0790322b59096372421bf0f1ffcc757ff22820940aee0e9b77eb07dad0be32df51388ecdb87841f6cf214931eec61222785ee29c220007dc45fe8bf10709b87ad74349c3b8f6563622c4c6d17a1e89c1fb74330322fd192190f9c76b30a7393edeacb6700b384014b1c5b9be83c756a620de5c026e3af3999bdcba8df33a6aa0d68d56834e1aef8110c2050e4fa590b569f2555487e3b47164b2e9a28094baa9fa0f47168e5b687f75353d81a4a869ec4c0c7aa539b733d2b7a5936f0e30e9becfb264ee82718d491efe47e05c15037a95409e8ef507a00f262baa8c4a80c1a02a89a9a98204dba4671cbaae4b4bedb21d2761c2999fb73ed53aa25688795dfefe08f25f72d61d2649db87392aa633d820baadefd700b007287fe68fc58592767fd5eeb4cc498eb74da5eb6dae45bc2c703e0986b6732f959c8ef3bcab5922feaa196a9c2a904c84358605c6b9b9f87ddfcf149ad2b8ae233d948f2ad960f0883cab2731e73f86877d24bbe6c7166252b84fc50d87dd774a56c1eff625b61ba58e2fe71153ce169910946ca7b98d87a97dc880ad0de4efa828426a5de108658b47376b69327761777b5567a472fe2921cf45748415375c07dcc533aa4ceb991184e8bfd5fc429b32e5e9d2b403379d2ad64441b68a80d58171e494942420f05221e96d181c8b4a0d8858811a4302a11ebfa3cd07b0d585697f8bcbd0016653315426bbcd1d5d7af0d1dceb7f740cb9b8646a1811b8d504baaffc28c84ba2dd44683091779fea5cf2fcf8f4f03e05ba8aee9afd11801a65733897d19b9f9cba193a6176bbb107ec810c39359d6c88a17c9eaee7adfd9d670949ff7d4eb50649001e11fa7da4462af03f2e867ef75ee0e2a06d4f321ff5dafe6284ff9ca509e5b39b471d7d75d9d4467ba003debc47d8940470bc09116baa6c87ac9563a161f86efcc79c4993642b127cff13d46c7aca610f7a3a9e564b99026142b0a84bbc2d07ce75b57fbc555c0dcd9673b7719381b9ffd0eb2e10efdc270fa067c5ee7de863b82cd78fd17a01e65386e2d439c4d66a54873df4fbd10caeb0720b01aefdacab1df6ba4b6319550aaebd0d70886b529f3dcedbe584413032a6653bf9a05dcb896ad958aa93361e13a8e7ec84dd5f2d728506cf968f4ff9731e97854f70ffb5e50488348f165bbecc9fe3361ce77d5ec730ac24004b7836c1bbbe9fbe16ba87af8580fe6a841ac3a0d4c138a7f4f8ee79cabbf1c17e544d536025be4c0499d550c88f120b7baead18a45df2ade2612665e1a4cdc3f0956f60c56f5caf27df3682ad6f0ce6a95dffdfe29d634f2d99dfc83e01627f02318758b6fc19fd456cf3071c26bc11ddecc316272d3977beae1ee55793833d5d33afa2cfbd8ca96d8d491fe9e6f24eec2788eccb7c4821537617663c38c9e574c1123a28bde4d3ecaf402d91cff0606c6d48780428168e0fd81f7be0828acf82bf1131cfd2574a5c118ce787fd94c8381f84161c79294f214"}, @NL80211_PKTPAT_PATTERN={0x8d, 0x2, "790083d8c00a5ddb15f6bf21eec21d94d81dbafa1c842220e7598c19ff5649bc53e486bc337834abea2fdfc79316dc679089ea72e03cad062ec09ada2a74f88c563acfd99844ad23d56ba5c3391bbdb573a4c6525fc51bf14b3ebb5909225d121e5a075e9824a9c7a50c768508ecbed267ba9fb0cb937c95bc521951cfa84006749cf6fec28556699f"}, @NL80211_PKTPAT_MASK={0x69, 0x1, "73d6b114c264fa3645b68dc07a8eb359b26c9de81a461aa2c6500f917317a1b52d38c48f146114d8095f003ba8684109950eff9834be5142dd8825d499fd38f294c92514ea7004f97cc6e56bbf57fb9cac4c0523a3cefede196023724decceec84399c8ede"}, @NL80211_PKTPAT_PATTERN={0x81, 0x2, "44683c6844f17bd19b130cea54c615d3d5f1b16eb11b5d58c3815d699e71abd2e780df3e6a150c5fecd2c6c430cf30eb99663eb55ec4ba2e5d9fc71c9d1fd829e091f7dda90ce518659ddc5524835ed6dac7e5b898276d36844b25d79f2b2d1a55e75d1d1a496ec17a4294c2044a6fdd4adb1d8e692d10f9953bafcfb6"}, @NL80211_PKTPAT_MASK={0x95, 0x1, "373bf68e1562fffa11547b13c0b0807d11143e054a9dbf9fd6b0280a1dc35897fab117718228666d47ab4b19f838dd4ac3fa80a534efa29019e76924f8aaf82a41827c8bebc8d8c9961ba5676adfc900d83631423159047849ec0e88a8b3339d7be41ae1c7643de3c338f1b96d6f43c8f004912377164d36f7ad4819cac44fd075626fda563bab1f7dd30f102001ea5929"}, @NL80211_PKTPAT_PATTERN={0xad, 0x2, "1226f6777c90bcefe6515a9c9d5c70a438805a68c361a64b138e56aadbee7128fb22ffb664642a0385d3fcd51ea16920a1d06b415989719c20bda18378a5535739ea4fda4abd79a285494c7a0b47c56148c2f372a158399f6c8fa8d3ceadc15a942c312e62d9c1e261bce4c41a7662cd662700b4d89484d73f3e69b628ef8c73f39daab5e39a48c52a34e9a9ab0ed7da5c8c24cdd16f221db3ecfd562ddc3188cb59c9a62157d101f3"}]}]}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xb0, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0xa9, 0xa, "d73fcfa43d98800a9c8f425e68a14e5742d50fe5b84970cb1d0776fc7e654860e0de51277df1fe5e51ec4a6cd90c2be2371f34eac826dea90e4ffd460388dee4d67747e4b63ce7c8e61518a62e00838ee72e8adb5fbe5d44105fe80c46b5d0d9565553196341dc648f7bf7141067c9eee18c35c43c12e476e8f1eb3b9e01b8e2628cc95c4f5cc5a1e539a7aa9d7bed6dbbd1ad6ecc6b682a0edc0148fcd9d6fb48caa9e4a9"}]}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x16a8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x138c, 0x12, 0x0, 0x1, [@NL80211_ATTR_BG_SCAN_PERIOD={0x6}, @NL80211_ATTR_SCAN_FREQUENCIES={0x1c, 0x2c, 0x0, 0x1, [{0x8}, {0x8}, {0x8}]}, @NL80211_ATTR_SCAN_SUPP_RATES={0x129c, 0x7d, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xf9, 0x1, "b17381eaecb991de2d2e91183127a1661535e6348a85e2fb88c64f5cd244b7ff79d971c75f3baec69d655431a337a9d485b050f3dfe5b362954820ada5582020f427253954165ffa785161798deb38a9aa6ae5834924d02663dc53238d5940c6133348a83e2eca6161616210bc7fd2026e4e7ff86f2ed8babf2a60e3e0d808495399079c3fe330b4f4381db8574705155649e86658d857ce8005044b11720991bf01bbb08a6e761b523de304086fda99b0f659a894f7a4cab4baa846f7777d8f2186599105ebbf2855e56706554ef1f18f980634565881d354033d5e0928781445e5f8d30ec4224f0d957a4c4ad9370c6189118102"}, @NL80211_BAND_2GHZ={0x55, 0x0, "eb60a5acd599a7af4ee71e47ff48298b5547ad82c8e92415da248b26208600fd3ed98cbcce974497bff66de79edf4de0c5bf9fabdeff2db2064c377aec30548e43bd172a477f3b93ea3ba510e74c3ff42e"}, @NL80211_BAND_5GHZ={0x99, 0x1, "5c71c94bf7ce7f3dab15b69273508b3d554b175bc6f1f80d1b1ca82c1537f7f11fc9d5a2a03005a0a83d8a6f92b1ade899be851b90cf10182c50a42551c995860288431093455f9aaa55a55602a0b6c27384bb8eedb5efcc72f01c18e1bc48be3969534c9399229941f038c0aec89c87a818868bf93f96070454bc8dee0a929f46d5c5167ea9fecb4832b3816c86ac169b20466260"}, @NL80211_BAND_2GHZ={0xa1, 0x0, "6105302096d4c7a685dbd7f2caa90f7a1c450833affcf08b7ef93e972056c8d0bbb19af0ac27be198fc9f20e350eb8e1b30bbcd4224869897f83f598fdbbcbd2ea610629575c727ea7f98b2e985bfb95f296f7bf33a7b6261fc87661dcb6a860f8ab0fa90facf2a1be685bc03f688a756620c7ace54fed50f67a89e6b0654c7bccc7598516c33746a021154eca51d21b210587ff572dcd907308f561a9"}, @NL80211_BAND_6GHZ={0x1001, 0x3, "8cce4d211b63b07cb5704d71984d7603e99c6182bc62f4beec86e3ff4fc1e724ffe644aa1f6b41d97c25b2b62f4c296487ec03cab4aef6aade1914f3a60f2dc00bb681d245b6592276df0d9d0f27f6a7d282778aba4e9b6256134d4709ca55ed04eff3eec76864d5d9eb7a7f5d62c1e1ab044be3f8c2bedcfb3983a82b129fb1c8a7a0ba4038a1848e98d457f1410a2cf597e7e66f7531f8648300aa714b12f12b7ac93dde83c054a12534e018cf5ada371b7fc28c3c73d878719307f77ba878c25269deb7481c61c181637efa9f5b5e912df3f2eae8f4b107eceb525f8a35a1d070750ed7f677c7c03d211a12115e197b84aad526ed01da0e6afcb01a4fb88d4b8fa8bac1c897391fc10298914bb3cde031de346d5a57df013525f9b65a460c605b65ad7a8ae13269013d7572a04c257a4bfe9f7011634ff499cedecc67431b8451c2a66be5b396521ca3838557bc165aca3c9d6215c6724fc68332eed9bc7da95bc6881effae360cabb8a44aaa81186088ab82dc7c573148c90893601aab7f1a1557977692e4581deb714456f4af275ae02d2cb47fcea889e3546146fcd4a973cb5dfe641873fd4197368116f7f8288d4bc12c9d684a3ac48fc495e549f0f0afffc2049e632e3e8188ecaf4c00af5875b2dde8d7f6df3cb88a521e2f949007854f4783bcdcf729bfbfce9e5d1b5f58e93afaf591cd8f74838c0f0b7c193ab676ee0251cfb11b9a360900ef47120fec3402b5c882372973efc822fa44a0f5c279d2d39c9dc91a97488bab8c197e062b5b4dac5b2803709297b67d093ccc2563e8b1919ec0855f2da0c6b4efe453669b4851e135ae60465d6ea32db3a368fb49e4a7eb570013917ce39c381c8065dda6190bdd82eb12be9abcefab086531cf81ffa533caed1d55d457fa7f37df897f326c1ddf0c456c3cc37131df185384b5bbdddcb373e20ea24488968164893da4a72cea56174dff7bca108edf404c6ce4fd18803a8894023e23263f0f22f8a72a9cf5fae2bbc75c3f2a77043117c2ecb177ff166d1e21787b6ed48ce144603ac1859f6d35b6f8edd55cadc0693fea6f0d8bd2b377d9785221309ab86c28dbd7f472d2f5b08f8e4389940cc910f76af08ad13e9ee06d109e99ebf552471c9aa0ff86f06dc4bd85917a218434de0a164f1fd79bd15c83529fca31cfb8d18f1b9be5a1e79387b78cc2606d989d77cf3f9ce0b22af00ba2fd4599661e703cbfff5635db7ac2dc59b158f393b20996ee76c6723d027fb8570dcc44279cf9651da9b25749ccfd44a3dc506c4a6d25d94b9e23a403832ec34bf1f9028fdf14b5646f0f9a0f851a791588a980f10b0cc9703d45ba4d02f3737417fb368775c93229eacd844586c3021605ec3387ed2ed26f3da42644b14d92594eabb55d16e948870b71130b582d42219ef021045128ee284035e43451fd6c9acf6cea16f3e4418037e2989ad794df1542c38ce6c05e4e5271ccc7a37294fa4ef3bd810b1cf9795df7194800831b87b863f0da5175487176b02aa885d537f1809a7dbb3ae153d23b2676a7091196c7ee50e1144ebddfc44ea956515b8feae55769a85c9777988dbee14e8815b4e0b88dda27b9892f406b8160f418afae4e5f7a22ccf03b1f5d95b06c7df2ce8baedbe05b7d5fdcde1a03a1e9cf153ffb5d9c04293b7e0d112115be9f05beed55646472ab385770320dc858cc6b587eb7707179291a25648e432949d51bebd359e0765e87d696f27720d2975bb94e83eab98eef345bc08b826c65b2f9bcd693629159d7c58b6f268ef5019c0cc02cf1e80ba0252f4035aa9bd28d7765e5dc101fa815b99a4a36fba5d2248dec1bdfb11b111c741780e7b225cf8147f99c68bd9e5450c1ab33e7f9104d103c49a9914816f03aa831df5eaedd578cd1b172b048f20beee96e6fd969fa4b93bcab33017abc896f3f407212af062907a0259dc823513f7a739bf23c69618790f7af6c1fc6b3954ec92b7412afdc765d05215f7a091c730be40c9dee746ffd68ac008c558e9fe8312d8025af2f94afa91e3cce70fdd3831528c68aa916ab88f1555b7fb8e9de600761b7459e75e16fccc7ae0246d34094ca22d21cadd76d2532a0104759ed531238832bccfe33ecdc3e7b4ab2021a812e5d6a40a0a62db15bb804d59ec059c126dc4ad1c81a4e3b445971aba6d0b20b612129cfb03240b76542cbbc2032df03921d2db5d0d2acc4d8fc0e5a716165741d2822604b08d4e0f83fbeeb20e01a0a30ae9e6d6090fde359d51cae5db5ea755812d89852e4afd7cc7fcd0695a602455fa6be565986cd4d3bccca9e44ced90e9c9eb102cd58d30e557b796cec413ab84c8e6d311dfd5962dae48711f76ca3e23b4eb2b906c588f74ded0e30c9e450410ef4a662c7d7cfc842398e22a795662467d6820f95746c0e59fd53758d2a00e7b8db7ed0232120af3847d2a4e4956dca97eee28971cfceb64df02cbbc7b1f5219f0eedefc357cc3502d59f1d0216e49b2ef293018ba8dc4def7e274b5ff1fe771d3386a6beaeb74fc61a5809948b15be2598888228394d5c049c26dc032588237dda4a43f414c184e0af18e6a8f48cc079f1a4034cc24acd977057c8a8f54b1e030d5c7e20d78a4146aa397ac1b343ab6308732adc871ff2e4f5e2dddb4f9df5167e4118cdfd7f826543e5b2e3a5c5aa5b1840098d542ca072c9b9e67ef5e9eb2b11b632e97f7da38f9c7515d5aadf8f080d39a019160da773172e31a33f82931ce37f9117b5a3df831e9e80e111d75c2ff862153c30d11b5bfee5c2242252ef93a617f421447b9616fa22f03db17c40612c76700d8d82a73f30f63fc4ab490218601a569c20ac441352118b36d0ce682d841a8add38c7ca9daed52b7291b6cccd5c73b9b0ba3c8bf70ebbf6bc5cc5818d45fa104fd55940401c75d8c17d6a76c68750ce219e1abc28cb4b2823d6661ceda0ad66f1cc81e6b680bf603f96479ef8fd1d70017fae260b13ba09cac3767a7b6d4dfd244e88e6fa4a7fd73b1b756a88add93c442bc2634c56a088ae8d5bfe17404df24b0eb5e5c430ff06e5c2a958c788ce10db3919049c81232a47e36a07134e71023abe6076e24d8795f6f0b4103da77b9a3116f9667d90c58ce68db5dba5f47bd275c78d6f5f50253326e3573602ee4ebc9c097e0de8269d2991fd30ee8e45a9e44cf553d01290670f327869c8cecf5d946e66ef5d8cc642eeab678d8450ca1a201b2418f9312283db708611dc5cd3e7e261ad0009032cd17dc1d9b51da3506b092e1dc996894a834821bc447d5c0b161e317084918713c0596d2e480164a811c29def5567ac558713da18f8062bda8f70bebd0284bb569ec276243275918cfea918decc9ea4335e19fbc83a93ad02140cabdb9d4f005253146350da9b03103001759187c6007332a4ae37b0d8d9628342060c929694dc17a8fa7183234a6c8c1ad32506b174f449cc2092026d1470cc92d9c4ffa6211bc84948399b1718b1d157215009de5b5f6da0db8383cc59e70d49cff549f2b2440208d9ec8eb24f42f7db11c8aaf0d6a10c1b1f7ae85c0044779363ca98e26c87a53cb9110771d6087076aa7c0e6274bbf7e52e2efbaa67d05b31d6bf039b18d0a264ed47e241d4bee9231333c85c08e8eff59f13c949c4ba448d4ea9b3e090ac3bc1fa9dfca6aad37c23abb418c3c17e528404b63161627fffade2493369babee1bde3a880258b46646ca88687a032918111532cf1ffd10445ae63556ac4ad5f2a1a76c04ac8d8a81263e2051cdd6b762a1592cdc7a02253de51a0904eb0924b9c567a14539d7887c8740f88f24917543c563e410f7c2067dc8d99824c12c42efd148f960d7edb626ef0e162abf9f0a1f30364bea323c5f1ee1582e4b45635fce81c2d37829b0ca7d9585784da0d23b24ae8cb8344553b1d53d2152acd4771facc53ff8982fcaa7247b251c3417b30f41d9b2c6e22451851a2a18da4e38bf23a48de73e309a19fe3a2d1f9632f62ec3e04c848457de42f227b862d9140b182a61280f3d002578e6d9e9182a17ac670f7bc6d396365ca750867eb8a9a12a58a046cfeec923a822b7ca01bd2fb43658b3e9a5144f584ddf97228c519a9908bcc040e43ea084994503d0e73cb2cebf30e31a84bd6bb3ea6d3eec644d36696a3f02bcf9743dacf2c4934167c41f5f8fb051a5e766e731a7f7808f78732110cae9fb516b37b70b6a0081f10f56b6620f1452248f8ddca29ba80ef6f1acc7eb1ab4b44b556543e59a634f5f364a70aabb4ca67a09653dd0f5bfd90e9e064ea1a6eea3a5b45594ea78ec1c73726f81bdc413bbbc6ece601f7966c7604217750696297f83d65d5c8853af7e9a9c3f297833feb60da2462f7b06389ac2c71c64256e1a7ef46deb4d6f7cc2726fe8c4ed78217528ec231fbdc2d029c0600025b1b83e74d1534767f41d43bd2e67f126798fd876082e99a2ce73da25287ae76dad5965c362da287992637599ce2953bf9e2059874bcfaae57b4520d4e94ca5c1d7f0c7ca04af2a3e9d361e8794f1271f9ec2a582243b0d44d753b31ab48e2f9c5755eb3b9e7d8421fef99a6c5dc74a00dbab13f3f21c769df6c7088a54ecd744ad52ace51703cbfb9279202639353511fe85b1d21765947241cdf7cfa124793f4f5ba3d0066bd1baba77b88e2c604f868573431c22790998669cac8f69e55d1a8452ea06f39cf5682f380d3f9db67e58322495a038afca12378ec4b2ce5ff2ba7a7edb83cd37d085be492bc0b620584f6a0507994f2d71261f92b33e97af913b71b1ff4121fe1c1bb7dd8d774e4b952c69c96b3db6ab161e4a187ed8d75870cb64b24f0c1a8605d7e3688dc85f458a7da0938839a3af5ebcc160b667c1768c3cd3993873e863ced7f590be17bed254dfe97457d745db72c064e9dd7f0e13a9c0c0b91b55d8f419c6788f767ae4b63b4f409dae9f154391c38a3cc9218eea28e499d467e434e64b2722800c0c6b3c299a136c939fffabb137af7ce65f129d727b8b68c4c49f10d9d21f34829b0108f8888edf1c0585fdd2c8ec626f390da4d370a7505d3e7d9da0c0a3d09d3e70793c037c93673c2b831ac20acae00c268f5336434ce959eb8e151e07d1f20401f49a635525cb720dc6ad0e66b3f8f4cf4436a6f110f3ab3ef3831600887edfa21a1f22f935d5aafd90bc7c3b314454e790530a230fe2dac18d086296adb7ed736387aa33a8b10519bccc3542e9a1189b2661fe930ebe073e118aac1c4e3338d7aa3b79a4f51e61500b737c9ac5ca8e77cef8168827e9392a8d3366edb8a70bd6ff3a2350992f13846296d84a42a49ef5cc23e8a8b65101694dbd2436ffd6974ae299b714e36ba3a3dfdbb66c4364f559010df18aeb36983f29da4e6dcdf48b5039bd113e30faf8ff9c65b125d25f372920954fde7a1aba730a1fc1c276cecd0057a5bf2bbb445f5ae42b9787bc6af21b57bde96629887e4ff77ebd4b3ae119316ba141cbf51f00bf7ff056dc0f91a3388b33e9cf0905c1edef7167861f3225551edabc1a343d2614489be9a2bd17e8c50f24a375d33cd937f2f8eba43860d20b55f8852ec8a02b8a9baf4ff15b50863d662e02291f3c7e3cea428a7e7eaa5748f375dc039aa80d34af37aa3edf7cdae878e5ad3ba436305f7c273b5a284d18ca0ceb61eff3559fd4409b8d8f5c817e5457ca9ee5afa549a98a4a8a30d80af3e48039c48c30eff4b0c7fa8e94ed67980dd71f6d504d67540762b7c1572a6b13c7bde0f775e2b27c73a1ea3"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x90, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ibss_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x11, 0x1, @random="61b5e2793c8c63e34e1c15609b"}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x14, 0x6, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x8}, @NL80211_BAND_6GHZ={0x8}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0xc, 0x6, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @from_mac=@device_b}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x14, 0x6, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8}, @NL80211_BAND_6GHZ={0x8}]}]}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x20, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x1c, 0x6, 0x0, 0x1, [@NL80211_BAND_LC={0x8}, @NL80211_BAND_60GHZ={0x8}, @NL80211_BAND_2GHZ={0x8}]}]}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x314, 0x4, 0x0, 0x1, [{0x21c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xf1, 0x1, "675bf9d63d1e0a62a467edcd33a381e063b7416ccc8263f324950c4627ebec76f8aef529721b8e2d2cfc4691f5f1bdd09a718d7e7ef5713f1c93d4b26f96d0b3683e1ad10e54b32f0114d088c3e9e728dab390489d512e33040f04132ff273369015c77a19c8921d73c367cac8ca1e891e44f9cec2ebcea2d73d5156da589b94a875a77f1fa95b3c34170e23cd3857195df826ae498b268a77fe7ab3d50c6cdaeef5c810c253206d01ffa78cacf5b5f5fdb00003e97ad75f312a06830f118e20ba9f685b6a396a7edaeb1a88c4db67f29b6417eb8709cd888763bb4ab2a2d6a1faca167f54aa6742e19ab01a21"}, @NL80211_PKTPAT_PATTERN={0xad, 0x2, "d60887aa1a245e701fe48b2dc2ca49d8bbd877b0ffe2b1d7414e19948f03e0c1e393999901272777b377ccd4dd5b2e649a30ea817f68c68a8bf0e3386b6397ad43a72ffbe21a46c74fee01d95349834795dbb7bcc6812eacc330695710e12752be92fb339d5c9397c334f4a8839cde1e17d20ca4fbe509e9a432ea610d2b3920ca040dfb823ac5f5f09159a8c2387e829314be427f1af5ef46966c2bd559b243f2e831833275e6f360"}, @NL80211_PKTPAT_MASK={0x69, 0x1, "991d3cf7b3eccda0c63ba4d8424d4eb603bc1d14072843775507ef93a31c89b5439da4f6af90aaf3a7b5dc991e4414642d8e1617a838ad9663fc2241b6410c0670117f8483c2dd4e12f28ec6ba7e0c2f87530cae1eec17836d9fbcd9e30df64d1e716ed745"}]}, {0xf4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xe5, 0x1, "85f4483261faebe59cb81e23ea57f97d4b924070f79bd52483492860870957887f633f6d99da7ec701a2be922c7f7f8e39006dc83772a9c2bdcc0c75fdf7e7e3f977dcaafc99f7b398c550e71f465d203663206b903719a498abe9f06860820af6a1b0410cf5d51a2a9857369d55aef8300a421430b6b3c02ccb3541b673f4d230521731898cbffafeaa45a76706f722e94553bb39cfdb8812ebf67f376196016aa9224f26a5600431dc031ef10ae06b2ac723e8ddd246cd959901be568eeb2c8c80effad0072b3f9b1d5d5bb8c79f5098449d3ae4e190c7f35b23d08b4268967e"}, @NL80211_PKTPAT_OFFSET={0x8}]}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x230, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x88, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_WAKE_MASK={0x11, 0xb, "d0f73c62dd8101cf0aaaf32481"}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8}, @NL80211_WOWLAN_TCP_DST_PORT={0x6}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @local}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x3d, 0x8, {0x0, 0x0, "a802daf6ba388a48e244afe6787607175403916c8c750a76cc97e6b95396fceee3e1fcddf4122588db80a5b59a7f14b988"}}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @broadcast}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x184, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DST_PORT={0x6}, @NL80211_WOWLAN_TCP_WAKE_MASK={0x69, 0xb, "ad02e9decd63a07558d17f41e9a2aa6e0c9ae5e9179d986a70760f9fabafd1d3caba832e4519c82d2af4333859a801b3ba663f1f2830f5f3e1e1fdedd6c3a2364e9b02c19e8bf61470b243dc4c1329f4233f2682914a166f70b70d67b38617dbd588b708a5"}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0xf1, 0x8, {0x0, 0x0, "8469ac141a26c161f8ed76c83346a61af090f07a00943551a678a82b6aabd330d6bcb8b480d51c9d5553dc2cbb886d2384c9664bb288a1802689fba881e3b768332fa0d78e21ab8b11d0cbe2a4514a5fe75b1129286e637036de61db5dfa84426382a7f512b0703049236ba1d0dfd40155eea2f5acb45746cf5776f2331f6ca09d7b1986f13620592a4556a89b220ee603e3bd74a692eeb43ff8a8c132a0928e8f6bab9988f335bcd3fc853d2471a9119c43b018de1597cd99172786f35309cd2cb424aa2b94cf5b13abd6098de4802c61d2f600d207cd41ee6a5a3779d4086b2190162e08"}}, @NL80211_WOWLAN_TCP_DST_IPV4={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10}]}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x1c88, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0xa4, 0x12, 0x0, 0x1, [@NL80211_ATTR_MEASUREMENT_DURATION={0x6}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x7c, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x24, 0x6, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8}, @NL80211_BAND_LC={0x8}, @NL80211_BAND_5GHZ={0x8}, @NL80211_BAND_2GHZ={0x8}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x1c, 0x6, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x8}, @NL80211_BAND_LC={0x8}, @NL80211_BAND_LC={0x8}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ibss_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @random="48280e806422"}]}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_BSSID={0xa, 0xf5, @random="bccb929fda34"}]}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x50, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_WAKE_MASK={0x39, 0xb, "a8e17962956ff27471e7ac44c80827cb463a56aadc6b1a84d8d8ea16fc3db2b16199f11531ac2870b500326a5ed7b69173ac066d22"}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @remote}, @NL80211_WOWLAN_TCP_DST_PORT={0x6}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x1b80, 0x4, 0x0, 0x1, [{0x234, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x4d, 0x1, "c91ebcada042b60a09a9d4cb03d9983394a86f4d208a326df3186b1856c4cb8403792e9e7d9be353b66dd7e8e52877ea979ad25f69d623a06e388291314baeafc96a5c402fb5d6fcb0"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xc9, 0x1, "aa092e7b2c21f6a9cacf04921592048b03b76ba0abef7384c106a17cd2694b7de19a13ed2f4590f55517482e2f69d3f3b75721d425513fbfaf4f1481c62e4356b4515c9fe4a8d5c7148c12ea89a4ae476e6ce9693ab139688aea6e88f102e81eef0070094f477fde16bd9b41c67b838361d73cf84357e3f345a306402a07b4d9d2cc1895c0d92bf36fdd3ac9445503114d63113e44cc74f065ca001b8e4b0a4a32bc40bcb34e3490d023be98e670f91846d6c1970a52842766bd8031d03589b30a1a7d1560"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xf1, 0x1, "c92ff275a91c23c6ea3e92c8c49d864c922f6dddd7d1461fbf110964b48aae827c7ef8bc6783100377d0e4cb760344d7f42ff2f926799ce42b340f27a250ae35432f7edb288de4cc475e9662c9ce80b08fae72d4bc0279da3f2b61b74c85c359e965fe98aa08d8482322f7f7b893082495072d1878598efb6d0955faeca9d282f9522bf0fed694f134bfcc85fa113e3803db68849c135908818c9f8d0b3fa90f49f9a7207da053b7e3bb8fee84fd9ada7e500023759320d746cf41c35d753e102fdcf8820d6cd173aabbb8c7eabd922c19661013ae4610a66b351324e33449b87d6e65b0ce81e6546bc05726fa"}]}, {0x208, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xe1, 0x1, "baa4bc9dfb9427064ed6323292fe936dc2cc484baa40b9e90c6d3a2472dfc8dc0af168690cf5eca1025af91d02219b65dc6db14c1abe9357574881d2549b18b973c4f16ffee4f65d430c86b6c4aa7c1513c9b1ab0af5071b0d2b14a75313247e9fa6c76d86693cb93221e0bd826bcce336805a168e483627fc7646001a64f3e99baaa2cf566a16fc42549a1d3bc41c971529011ba5f5d84dae1a49d5bbceda2707c7c45889b17ddfe3f34fed46a3b4d6dbebd81c6fa652973e8e8a9d7595e982e64d8e82a6dc1e6f00cf8fc0d2c5a8a19d75129777aed2def5d7b2c096"}, @NL80211_PKTPAT_MASK={0x39, 0x1, "57a7fb66cb9f789d99b598976e1e3113e3a45208c5ee43c78c1c271be643db87d186a978f1318f0ad3341409c258966fc7acbcc628"}, @NL80211_PKTPAT_PATTERN={0x5d, 0x2, "b218d059980d52f82ed8e12b8a3de0e36a55fcb29bc836a854508f89ee26df334c4c66ca92f0802b62a9cca938121b498aa84da47a19620cbd96d77889bfe0beecbbf3fe36dee4d04b00a1bec476da0fbc316f8c0a0cb6cfe8"}, @NL80211_PKTPAT_PATTERN={0x41, 0x2, "e40ea13dcab2a6f433ae832b676ab97f7619d39a420a2c354dc196d8a947cb2550a46b532b1b7c2df672629f9a21859e2a8d260a610c8e56c70befbf7d"}, @NL80211_PKTPAT_MASK={0x3d, 0x1, "fc3d2734a54ede0ca4dd444715ae00b4772de8081a60c115aaf270ff414930cb3121c8b1962a8bb37cc9d463127490abd7cf503c8bf7a23625"}]}, {0x1178, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x1d, 0x1, "4300e3aad5c8d822ac05fa7914a7232bab7be34b85b50badd8"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x1001, 0x1, "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"}, @NL80211_PKTPAT_MASK={0x61, 0x1, "742564c155fc1c2c349124d828d00d7446cba12a8949b3c6c81a0f56dcaeff7fd3ed232cc3c6220cfa6d77234d0c1e80088a257916c755e0c97811d3d640e09b34c48d58e174caa1ab85ca28664c10c2fc70206df9e5a9f62d348e098c"}, @NL80211_PKTPAT_MASK={0xe1, 0x1, "d95cc3de5b1c911f8cc884255f6e95824d2588b21ecc649e3b2794e75e49dba9ad0d701b17f29c224e7eb597e13bb8b8ecb1dc51b80462d8f24b13695e78927715f6aa5fb037380a457132e27d494c929b1aaacf01afede2becb072aaffb4ed622a50a773bc225880f6e0cd816fd8345f06943d8b92e120da8f01700951ed9562c274b93b73a99e9ad94e12b90a32943d99f95b1438a248f71b93d6f70f8ca31e3fa784ad3060b2404ff4ca9a2ced1b0b7093d4b3b14c90e56182da2225085a9f02e8dcb93326f7bf9cbc1372b3d3c2f3ca54f96560f522eff6735bb42"}]}, {0x128, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xf5, 0x1, "b4ce3e1401aa3446fe85f5b4c54caf441df815faeae94f87928117633d43e425e65b58984a814e22151fc1006471a0618447e0a24efc5823ddf49c972dd4a715b3a76c080c2b66a5e779534ba7237d0405a1cfa0815549e1329f39b979a24bca76c053d5d537662801d1c691b4a5dc44bc96a31e12305fffb2c1db3494c6dd2d23a8cd35193aa5b6d5563b856571d0265af56070be8470a5a5ffa4b44998d9a11d04bac65a0b21c9df47187e15dd6d93a41c4583f4760789719726cf849c1759abdea9d9d29dd895354ccdb96a7ed2807031fc9b28ef251084061f3d508516e4978009032ca384afea2a75991a7b10ab9a"}, @NL80211_PKTPAT_MASK={0x21, 0x1, "15e8cf87c054d7221d5611798c902633e13db7d5475d8484d9a766e50e"}]}, {0x1a8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x51, 0x2, "f1a8e9692275b6aeda2a6050de925d7fa6a5680256ad3a99d8c8b95169da951bb6e22e988de76a4c7e0cf875539b7dd0d3541dee621508e64d31511aaa3894ab5c2463cabb0a1fa11993d6652a"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x8d, 0x2, "fa415a39c4475efc9c85e1a237f8441645ef8498f03c98100ef471174d21df5e5738620997da041d921bc940433852543dc50ccb3e03472993ab1a30883c9453092742c07d32396de6fdf12aa68e956e0332e940aab0ac33cf13aad4c2aa3a9f440a43190725a5a3df756a78d0aa9cd11af2b0c184af408d53b872b910c2ef2563f5e9ef0dd5d819df"}, @NL80211_PKTPAT_MASK={0xad, 0x1, "28287b1679d93ac802b2ed6fdf84a9bf99a2b5bdfd3bc09e6225596f2c06de0c929ccaeb73aba04eb2f3de17d0b0e635a2afaea50d9ebd994394f96eafa0abc9fc2ca6e7943c1409494376af5ceb2921d991d17d8964ede80bbcac99e19538a34d8e954573eb5c3c2283df5d77fb4c857e2b9bf3afc0d1ab4970ccba7f3bb2d6422c483db25da13bfa94ca5989b8eaa0b01e521beb3ed8b6eb5cb518ee1c53c3affed98eacebca7a3d"}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0x2f4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xc1, 0x1, "30f415a17ac4ce57ca3762a41d6d8ef67f07e8b835847afb1ca09a0f028fb4beac254a57290e431aeeae569874fed28b64f7580c6996e04cb4de34a8586bf0787e6cffe863b6cadae57d5402fa18ee0e0f8796bb1c6c4160f5dbbb34cba5e20dc0c7bd9f76df85109d5f1595c96e6f2295cac44c0d59277c4a259b19e67e0c75bed282131bbac287c3c8200da63378bb6ff5470118be0de07003c94076df9c05768d988aba25ac5af565f23f367faf966013eafdad40ad568eaa0524d1"}, @NL80211_PKTPAT_MASK={0x89, 0x1, "0ce91547f1f90f77d540440c8778a1c3cedd53677083736f0a4d53e09d388d06329954e76e0b233c5867f6ea1b576ae3243e2f4c4b188bafb8fe7aaf3d579a227f85d6cfcd79cc551ce91f2d909a831dfbc79be17c5129b65dcb8e9015dd294cd29cda7af7d2710c278ec3cab8652169517c6d43eb1ca43f3cd6d38e8a0427991f1ce008e7"}, @NL80211_PKTPAT_PATTERN={0xed, 0x2, "53fdda8e5d5970538086eb3bc39fbb4256aa65f12eec9a951fc677e4ad08b364a6330aeeb030ac6f7908468af31f62231e7dbfc669e96b6f889003d58be14dd7b29cc69df46132ebf19b231f0cb38371a73571f843b69f09a57efd741b5ca3d8b2f2fae72b8b668702bc2baa2a4fe51306c8147ef0948b305ab4cadea2b49fb0a03e90e827b7b2117497e0a3b3ea498e4ffe28fdaef8fe2df94101fcd4f7365f9d49d26e9c6b3ca27604519728b5a4186efbb4e2de70c4ad78e60c3a6f8aaac4200912195d315b19fb16b67fb2bd2419c25bf30dd5e6674c00cf6d14f435817aeccbf5186926608979"}, @NL80211_PKTPAT_MASK={0xa5, 0x1, "c42336730a76126cfd1917327cace149d2551e0e65ef187b03b48dd91a17c78dcec1a9e52891d2f89ef47a3142a6a3fb8c2ee0ec4b8c34a422552ba3592efdbbd0414d099ede0308ee0619155716bb2f87149f121ec7a018e0fcf44e0a4e4dc016529078d9de86eeecb4122e1c3a1a2dc4a2b25838915b3e7024e082dc24617828d280f8c9ea7b1dcb2a9accc01aa96013213bfa3aba264a4032d653608721c3bc"}]}, {0x4}]}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x40, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x8, 0x12, 0x0, 0x1, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x2c, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_FREQUENCIES={0xc, 0x2c, 0x0, 0x1, [{0x8}]}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x10, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0xc, 0x6, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x8}]}]}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x78, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x64, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCHED_SCAN_DELAY={0x8}, @NL80211_ATTR_IE={0x58, 0x2a, [@fast_bss_trans={0x37, 0x52, {0x0, 0x0, "00f6a14a9ba4b0eae82c5f0dd92777b1", "c492b6d19ff2cdb121b555d1e93540cb94821782b0a539648364551dba2fe339", "8b2565aa42b64d15beb7a13839be8a59edb4a2d6706d423ad70ce29587c60161"}}]}]}]}]}, 0x7ec4}}, 0x0) 00:59:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8904, &(0x7f0000000200)={'wg1\x00', @ifru_flags}) 00:59:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 00:59:01 executing program 5: ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000040)={0x3}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000180)={0x9, 0x7, 0x0, 0x0, 0xcf, 0x10000}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x1000, 0x6, 0x0, 0x6c8c}, {0x2}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000740)=""/176) 00:59:11 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:59:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="7100000022000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:59:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000200)={'wg1\x00', @ifru_flags}) 00:59:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r1, 0x521}, 0x14}}, 0x0) 00:59:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000000)={'ipvlan1\x00', @ifru_hwaddr}) 00:59:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000200)={'wg1\x00', @ifru_flags}) 00:59:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000200)={'wg1\x00', @ifru_flags}) [ 3147.979841][T31133] loop2: detected capacity change from 0 to 264192 [ 3147.981382][T31126] loop1: detected capacity change from 0 to 264192 00:59:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8901, &(0x7f0000000200)={'wg1\x00', @ifru_flags}) 00:59:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x5421, &(0x7f0000000000)={'wg1\x00', @ifru_flags}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) 00:59:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@abs={0x585c5c2003700f58}, 0x6e) 00:59:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 00:59:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000002540)={0x0, 0x0, 0x0}, 0x0) 00:59:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:59:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:18 executing program 4: openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) 00:59:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0xf03b2900) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000000000004) 00:59:18 executing program 5: openat$ptp0(0xffffff9c, &(0x7f0000000000), 0xc00c2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 00:59:18 executing program 4: openat$procfs(0xffffff9c, &(0x7f0000000600)='/proc/bus/input/devices\x00', 0x0, 0x0) 00:59:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000001100)=0x3ff, 0x4) 00:59:18 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x3c, 0x4) [ 3155.119481][T31158] loop1: detected capacity change from 0 to 264192 [ 3155.128317][T31160] loop2: detected capacity change from 0 to 264192 00:59:18 executing program 5: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/diskstats\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), r0) 00:59:18 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) clock_gettime(0x5, &(0x7f0000000000)) 00:59:18 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCGDEBUG(r0, 0x80047441, 0x0) 00:59:25 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:59:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000003700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002000, 0x0) 00:59:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0xf03b2900) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000000000004) 00:59:25 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x6000, 0x0) 00:59:25 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) 00:59:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x0, 0xff}, 0x0) 00:59:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg(r0, &(0x7f0000008000)={0x0, 0x0, 0x0}, 0x0) 00:59:25 executing program 5: syz_clone(0x800300, 0x0, 0x0, 0x0, 0x0, 0x0) 00:59:25 executing program 0: sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) 00:59:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xffff}]}) [ 3162.322333][T31189] loop2: detected capacity change from 0 to 264192 [ 3162.334302][T31191] loop1: detected capacity change from 0 to 264192 00:59:25 executing program 5: prctl$PR_SET_NAME(0x21, &(0x7f0000000ec0)='ib\x00') 00:59:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) 00:59:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f00000000c0)=0x6, 0x4) 00:59:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0xfffffffffffffed1, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV, @NL802154_ATTR_PAN_ID, @NL802154_ATTR_PAN_ID]}, 0x14}}, 0x0) 00:59:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0x0, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:59:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0xf03b2900) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000000000004) 00:59:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:30 executing program 0: prctl$PR_SET_NAME(0x3e, 0x0) 00:59:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0xc0189436) 00:59:30 executing program 4: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffe) 00:59:30 executing program 4: keyctl$KEYCTL_PKEY_DECRYPT(0xa, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="f1cf7c0178b761b4838a1d8f5b776d68bb82825f56cf28a9707f6f24a2488035"], 0x0, 0x0) 00:59:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000005c0)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) [ 3167.445568][T31227] loop1: detected capacity change from 0 to 264192 [ 3167.455348][T31229] loop2: detected capacity change from 0 to 264192 00:59:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x1274) 00:59:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/xfrm_stat\x00') accept4$phonet_pipe(r0, 0x0, 0x0, 0x81800) 00:59:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg1\x00'}) 00:59:37 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0x0, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:59:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000092c0)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000180)="fbefba190ca5ce5d9d58ea1668088cad2730e83e41526996d2bcdf4defdbabbfc39a481dcf2bf8f39c2defd084fbb7afdb9300e0ceb386a5573253a75023b679545cad00f30207e670ab6d8a9e905d9e487d454e77eb04d2c436c6d26d57d4d15cd578a3f92060aec379d7158fc6efe1a57e5613a0cc8dd09f19e44cdc88bba715d7f0161d6a7f13cedd8e720bebccd818050a018581936b7d8cf5b7a29f22ccbe102e60fc7f9965a5caa28eef69c7a006fc403e845b773296ee97615e5b74dbf0e6bdafa52567842f688273f6cfbc76c13b0009e606e9b1007998e6a20c2e5ac41d68f4f7c278", 0xe7}, {&(0x7f0000000280)="2839a6f3afd0496f1ad51b835209d8e36c92e5760b7cf882c80298e58ea5ace9241623624ed2d66e56823709596d4815400507d5085da0bf9661cb6e9c8464bd6778dd009777565cb408d829b5093a1393998047141af7a38cfda80f79eeb13fcf86180c27547470b7f80cf6be8194cc7887ad6a09b8335528a1822e8aa6533397001d0dd5b63ce52269402daddd7762fd147c7bce9440505126227009474121eebec38ba3994132f4a00927c3ea878eaa361db89bb24afe1e511fbed97c512556a70e46878ad17647da9fddf006e27a8e", 0xd1}, {&(0x7f0000000380)="d2bc94f484d898d9fb4168ff26ce186a0ed98882037dc0475b87175b2aac5b0392066f7beb6f9c34bb3a75126775bfdca6b4a0de2faeb18b350ed97e73cac141a6dd735f3defb6a5e4d32336", 0x4c}, {&(0x7f0000000400)="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", 0xcbd}], 0x4}}], 0x1, 0x0) 00:59:37 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x15, 0x0, 0x0, 0x0, 0x0) 00:59:37 executing program 5: keyctl$KEYCTL_PKEY_DECRYPT(0x10, 0x0, 0x0, 0x0, 0x0) 00:59:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8000000000004) 00:59:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:37 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f000001b240)="94063957c14281b009ce567953e410127a2358fba27806cf8e04125730dbc37b946b20c1696e50fed9e9f3036b5a5199ddbc568073a9e71393d65227d0e47279c55c060ac8685d006e4ae7ef0066b884f73e7c5852f024dda02cb40c6778f54e7a4f8ae024d912f3115207e585a97c838b2f135bbcd5a5aeb0eeb704834bb774d658e4a15a21591802c1fdc892d174540b79cc7fa299dc60dba793a56515bbe17aeaf157f4cce658dce622bca6a86bbf2859e0fac11223966be4fae52f6ccee916967d46843b3257594590220001f4fc5fdd1a5d39d6a73c0fff1857712489ca174ee993358095c67501b8ffbc461c349f3a", 0xf2}], 0x1, 0x8f0e, 0x0) 00:59:37 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/prev\x00') write$cgroup_pressure(r0, &(0x7f0000000180)={'some'}, 0x2f) 00:59:37 executing program 5: socket(0x1d, 0x0, 0x7f) [ 3174.558835][T31255] loop1: detected capacity change from 0 to 264192 [ 3174.571471][T31259] loop2: detected capacity change from 0 to 264192 00:59:37 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/prev\x00') write$cgroup_pressure(r0, &(0x7f0000000180)={'some'}, 0x2f) 00:59:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000440)={&(0x7f0000000180), 0xc, &(0x7f0000000400)={&(0x7f0000000200)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]]}, 0x30}}, 0x0) 00:59:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) 00:59:44 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0x0, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:59:44 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/prev\x00') write$cgroup_pressure(r0, &(0x7f0000000180)={'some'}, 0x2f) 00:59:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, 0xfffffffffffffffe, 0x0) 00:59:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000fcdbdf255a000000080003"], 0x28}}, 0x0) 00:59:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8000000000004) 00:59:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:44 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/prev\x00') write$cgroup_pressure(r0, &(0x7f0000000180)={'some'}, 0x2f) 00:59:44 executing program 5: socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), 0xffffffffffffffff) 00:59:44 executing program 4: write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000180)={'some'}, 0x2f) [ 3180.984249][T31285] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3181.000968][T31288] loop2: detected capacity change from 0 to 264192 [ 3181.012599][T31282] loop1: detected capacity change from 0 to 264192 00:59:44 executing program 0: r0 = syz_clone(0x10000400, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x1e, 0x37, 0x0, {0x0, 0x9}}, 0x1e) 00:59:44 executing program 5: mincore(&(0x7f0000bff000/0x400000)=nil, 0x400000, &(0x7f0000000000)=""/49) 00:59:44 executing program 4: write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000180)={'some'}, 0x2f) 00:59:51 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:59:51 executing program 0: syz_clone(0x60000000, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 00:59:51 executing program 4: write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000180)={'some'}, 0x2f) 00:59:51 executing program 5: munlock(&(0x7f0000ff9000/0x1000)=nil, 0x1000) 00:59:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8000000000004) 00:59:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 00:59:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$cgroup_pressure(r0, &(0x7f0000000180)={'some'}, 0x2f) 00:59:51 executing program 5: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000)=0x7, 0x3f, 0x0) 00:59:51 executing program 5: execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) syz_clone(0x8000000, &(0x7f0000000000)="a3794b5e587165b3eb23e3c868ce7817023c4433b67faf2bb4653bdb4956829b8ffea9ce7ae46e3bb610605a57bc086e94564320b791ae91d6e8a21537226f0a55fa175d49f57ce711ac3b4c30b6aaacf9226e2ae8b52d86c55be5fb905154e359e17d131d984bf2c671ec2a09a69c63de6876e107d0b7b9cadadcd6c5005ddb95c917c2c71ab0cfd399", 0x8a, 0x0, &(0x7f0000000140), &(0x7f0000000180)) 00:59:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$cgroup_pressure(r0, &(0x7f0000000180)={'some'}, 0x2f) [ 3188.162887][T31317] loop2: detected capacity change from 0 to 264192 [ 3188.179236][T31321] loop1: detected capacity change from 0 to 264192 00:59:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$cgroup_pressure(r0, &(0x7f0000000180)={'some'}, 0x2f) 00:59:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x10, &(0x7f0000000180), 0x4) 00:59:54 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 00:59:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x22, &(0x7f0000000180), 0x4) 00:59:54 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/prev\x00') write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000180)={'some'}, 0x2f) 00:59:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 00:59:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x1e, &(0x7f0000000180), 0x4) 00:59:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 00:59:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x7, &(0x7f0000000180), 0x4) 00:59:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000180), 0x4) 00:59:54 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/prev\x00') write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000180)={'some'}, 0x2f) [ 3191.172802][T31350] loop1: detected capacity change from 0 to 264192 [ 3191.180139][T31347] loop2: detected capacity change from 0 to 264192 00:59:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 00:59:54 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/prev\x00') write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000180)={'some'}, 0x2f) 00:59:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}, {0x8}}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @empty}]}}]}, 0x48}}, 0x0) 01:00:00 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/prev\x00') write$cgroup_pressure(r0, 0x0, 0x0) 01:00:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x6, 0x9, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x448, 0xffffffff, 0x8b8, 0xbb8, 0x0, 0xffffffff, 0xffffffff, 0xdd0, 0xdd0, 0xdd0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip6erspan0\x00', 'wg2\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@ipv6={@mcast1, @remote, [], [], 'nr0\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'macvlan1\x00', 'gre0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:printer_device_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) 01:00:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x448, 0xffffffff, 0x8b8, 0xbb8, 0x0, 0xffffffff, 0xffffffff, 0xdd0, 0xdd0, 0xdd0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip6erspan0\x00', 'wg2\x00'}, 0x0, 0xa8, 0xc7}, @common=@inet=@SET2={0x30}}, {{@ipv6={@mcast1, @remote, [], [], 'nr0\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'macvlan1\x00', 'gre0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:printer_device_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) 01:00:00 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:00:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 01:00:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:00:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x13, &(0x7f0000000180), 0x4) 01:00:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x6ca, &(0x7f0000000180), 0x4) 01:00:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x6, 0x1b, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x448, 0xffffffff, 0x8b8, 0xbb8, 0x0, 0xffffffff, 0xffffffff, 0xdd0, 0xdd0, 0xdd0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip6erspan0\x00', 'wg2\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@ipv6={@mcast1, @remote, [], [], 'nr0\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'macvlan1\x00', 'gre0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:printer_device_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) [ 3197.555014][T31375] loop1: detected capacity change from 0 to 264192 [ 3197.563866][T31376] loop2: detected capacity change from 0 to 264192 01:00:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x4, &(0x7f0000000180), 0x4) 01:00:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x1b, &(0x7f0000000180), 0x4) 01:00:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x6, 0xd, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x448, 0xffffffff, 0x8b8, 0xbb8, 0x0, 0xffffffff, 0xffffffff, 0xdd0, 0xdd0, 0xdd0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip6erspan0\x00', 'wg2\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@ipv6={@mcast1, @remote, [], [], 'nr0\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'macvlan1\x00', 'gre0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:printer_device_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) 01:00:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getqdisc={0x28, 0x26, 0x9cf469e17c9f5ec5, 0x0, 0x0, {}, [{0x4}]}, 0x28}}, 0x0) 01:00:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000050c0)=[{{&(0x7f00000016c0)={0xa, 0x4e22, 0x0, @mcast1={0xff, 0x0}}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000040)="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", 0x9ba}], 0x1}}], 0x2, 0x7bffffe7) sendmmsg$inet6(r0, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000011c0)="a510b461b80fadcbc8b6cbc0225a6ffee3", 0x11}, {&(0x7f0000001200)="7356017b59ba079f6aedc280f6e2690ccc0f890293623fcf5cacb37dff61447328d945228c45fa6fba4ba8346e5542f233be6a0b93b52823c565136d6ca9e80a1ebbc71094fb4eb77bf7fc109f28d4c29eeff0fb46514d1b05f07a7f74484460f9bc67077a659597edbfa57a66b3c0b821bba4088642f6655f589186ffcd72fcc6cd82f36bbfe3f14f9e483927c582d8a927e96745914044f4ac5d20d6c72a4c9b76181e0ecfa117ac490b46db8ce8e30ce06bf26ecc0d0c0148b20dfe4d33a425fdbb5db4ced88d2daff8c659a9419baaf94e676b49a4a3449743ee83bedb63601e4ce89cd3ba3c1d8ea7d81c381c78ea", 0xf1}, {&(0x7f0000001300)="8085cef45199ebcc8cf2f2c21242a7b0e5423b73460adfc511cdda81ab68b0440622791720161ee029700abf0f43c6135ba1edfe3d167ea52e40d7e442b31db38ca5198b40d0e58e8d1967c84b361d622f08301d10780d0a875a85d0317bfa0a2fc7dc08ed172bfaff994085cd812cd32fefe8951c03a0b61287cfcdfd9a048461dd09ac82bff92d338af6ddaa", 0x8d}], 0x3}}], 0x1, 0x0) 01:00:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x30, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x448, 0xffffffff, 0x8b8, 0xbb8, 0x0, 0xffffffff, 0xffffffff, 0xdd0, 0xdd0, 0xdd0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip6erspan0\x00', 'wg2\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@ipv6={@mcast1, @remote, [], [], 'nr0\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'macvlan1\x00', 'gre0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:printer_device_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) 01:00:07 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x0, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:00:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x6, 0x4) 01:00:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x6, &(0x7f0000000180), 0x4) 01:00:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x6c9, &(0x7f0000000180), 0x4) 01:00:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, 0x0, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:00:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 01:00:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x448, 0xffffffff, 0x8b8, 0xbb8, 0x0, 0xffffffff, 0xffffffff, 0xdd0, 0xdd0, 0xdd0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip6erspan0\x00', 'wg2\x00'}, 0x0, 0xa8, 0xc8}, @common=@inet=@SET2={0x30}}, {{@ipv6={@mcast1, @remote, [], [], 'nr0\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'macvlan1\x00', 'gre0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:printer_device_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) 01:00:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x448, 0xffffffff, 0x8b8, 0xbb8, 0x0, 0xffffffff, 0xffffffff, 0xdd0, 0xdd0, 0xdd0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip6erspan0\x00', 'wg2\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@ipv6={@mcast1, @remote, [], [], 'nr0\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'macvlan1\x00', 'gre0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:printer_device_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) 01:00:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x9, &(0x7f0000000000)=0x6, 0x4) [ 3204.722259][T31410] loop2: detected capacity change from 0 to 264192 [ 3204.729382][T31414] loop1: detected capacity change from 0 to 264192 01:00:07 executing program 5: syz_clone(0xc6900180, 0x0, 0x0, 0x0, 0x0, 0x0) 01:00:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x17, &(0x7f0000000000)=0xffffffff, 0x4) 01:00:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x8, &(0x7f0000000180)=0x80000000, 0x4) 01:00:14 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x0, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:00:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x14, &(0x7f0000000180), 0x4) 01:00:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0xc, &(0x7f0000000180), 0x4) 01:00:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0xe, &(0x7f0000000180), 0x4) 01:00:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, 0x0, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:00:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 01:00:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, 0x0) 01:00:14 executing program 0: syz_clone(0x79008480, 0x0, 0x0, 0x0, 0x0, 0x0) 01:00:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00'}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020fffffff600000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1101000000000000000001130000000022001701", 0xa0, 0x8800}, {&(0x7f0000014600)="2200170100000000011700080000000008007809140b2a3a0802", 0x1a, 0x8b800}], 0x0, &(0x7f0000000340)={[{@gid}, {@utf8}]}) [ 3211.838167][T31443] loop2: detected capacity change from 0 to 264192 [ 3211.854886][T31445] loop1: detected capacity change from 0 to 264192 01:00:14 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020fffffff600000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1101000000000000000001130000000022001701", 0xa0, 0x8800}, {&(0x7f0000014600)="2200170100000000011700080000000008007809140b2a3a0802", 0x1a, 0x8b800}], 0x0, &(0x7f0000000340)={[{@utf8}]}) 01:00:14 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) [ 3211.895275][T31457] loop4: detected capacity change from 0 to 2232 01:00:15 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@md5={0x1, "a6ab1dd8489db54a96a23369229aceeb"}, 0x11, 0x2) r1 = openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x80200, 0x40) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ftruncate(r0, 0x208200) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r5 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, r5, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r3, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff6, 0x11, r2, 0x0) read(r2, &(0x7f0000019440)=""/102391, 0x18ff7) [ 3211.938721][T31459] loop5: detected capacity change from 0 to 2232 [ 3211.968964][T31459] isofs_fill_super: get root inode failed 01:00:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x0, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:00:24 executing program 0: socketpair(0x0, 0xb, 0x0, &(0x7f0000000000)) 01:00:24 executing program 5: openat$sysfs(0xffffff9c, &(0x7f0000000180)='/sys/block/loop0', 0x329080, 0x0) 01:00:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xf, 0x0, 0x0, 0xffff, 0x4a8, 0x1}, 0x48) 01:00:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 01:00:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, 0x0, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:00:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004081000418e00000004fcff", 0x58}], 0x1) 01:00:24 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020fffffff600000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1101000000000000000001130000000022001701", 0xa0, 0x8800}, {&(0x7f0000014600)="2200170100000000011700080000000008007809140b2a3a0802", 0x1a, 0x8b800}], 0x0, &(0x7f0000000340)) 01:00:24 executing program 0: sync() statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 3221.039866][T31474] loop2: detected capacity change from 0 to 264192 [ 3221.046193][T31477] loop1: detected capacity change from 0 to 264192 [ 3221.077448][T31486] loop5: detected capacity change from 0 to 2232 01:00:24 executing program 4: r0 = openat$tun(0xffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) [ 3221.121656][T31486] isofs_fill_super: get root inode failed 01:00:24 executing program 0: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 01:00:24 executing program 5: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x5, 0x0, &(0x7f0000000140), 0x1002042, &(0x7f0000000180)={[{@nojoliet}, {@mode={'mode', 0x3d, 0x1d}}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}) 01:00:31 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:00:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000006c0)={[{@fat=@dos1xfloppy}, {@fat=@check_strict}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 01:00:31 executing program 0: socket(0x1, 0x0, 0x10010) 01:00:31 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000440)='/proc/stat\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x2010, r0, 0x0) 01:00:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 01:00:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 01:00:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000c00)={'bond0\x00', @ifru_hwaddr=@remote}) 01:00:31 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000200)=@md5={0x1, "a6ab1dd8489db54a96a23369229aceeb"}, 0x11, 0x2) openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x80200, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) close(r2) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) sendfile(r3, r2, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff6, 0x11, r1, 0x0) read(r1, &(0x7f0000019440)=""/102391, 0x18ff7) 01:00:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000180)={0x3, 'vlan0\x00'}) 01:00:31 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$incfs(r0, 0x0, 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, r4, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r2, 0x0, 0xffffdffa) read(r1, &(0x7f0000019440)=""/102391, 0x18ff7) [ 3228.244213][T31508] loop1: detected capacity change from 0 to 264192 [ 3228.258932][T31510] loop2: detected capacity change from 0 to 264192 01:00:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000480)={[{@nodots}]}) [ 3228.365444][T31526] FAT-fs (loop5): bogus number of reserved sectors [ 3228.372020][T31526] FAT-fs (loop5): Can't find a valid FAT filesystem 01:00:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x2, 0x0, 0x0, 0x28bb}]}) 01:00:38 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:00:38 executing program 5: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:00:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000180)) 01:00:38 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$incfs(r0, 0x0, 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, r4, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r2, 0x0, 0xffffdffa) read(r1, &(0x7f0000019440)=""/102391, 0x18ff7) 01:00:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 01:00:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:00:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) fcntl$notify(r0, 0x402, 0x0) 01:00:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 01:00:38 executing program 5: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@sbsector}]}) [ 3235.360290][T31539] loop1: detected capacity change from 0 to 264192 [ 3235.362506][T31542] loop2: detected capacity change from 0 to 264192 01:00:38 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000280)='/proc/consoles\x00', 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000002c0)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) 01:00:38 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x42812, r0, 0x10000000) 01:00:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='oom_score\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x0, 0x0) [ 3235.487168][T31551] ISOFS: Unable to identify CD-ROM format. 01:00:44 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:00:44 executing program 0: syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001b40)={[{}, {@mode}]}) 01:00:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)={[{@fat=@usefree}]}) 01:00:44 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$incfs(r0, 0x0, 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, r4, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r2, 0x0, 0xffffdffa) read(r1, &(0x7f0000019440)=""/102391, 0x18ff7) 01:00:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 01:00:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:00:44 executing program 0: syz_io_uring_setup(0x2013af, &(0x7f0000000000), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) 01:00:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000040)={'bridge_slave_1\x00', @ifru_names='veth0_macvtap\x00'}) [ 3241.751035][T31568] loop2: detected capacity change from 0 to 264192 [ 3241.751780][T31571] FAT-fs (loop5): bogus number of reserved sectors [ 3241.758222][T31569] loop1: detected capacity change from 0 to 264192 [ 3241.764171][T31571] FAT-fs (loop5): Can't find a valid FAT filesystem 01:00:44 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open$dir(&(0x7f0000000140)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000340)='./file1\x00', 0x0) rename(0x0, 0x0) renameat(r0, &(0x7f0000000200)='./file1\x00', r1, &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000480)='./file0\x00', 0x0, 0x24) socket$inet_udplite(0x2, 0x2, 0x88) 01:00:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000040), 0xfffffffffffffe28) 01:00:44 executing program 0: syz_io_uring_setup(0x13af, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x159d, &(0x7f0000000540), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) [ 3241.883449][T31584] loop5: detected capacity change from 0 to 264192 01:00:44 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) fcntl$notify(r0, 0x402, 0x20) 01:00:51 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 01:00:51 executing program 0: r0 = openat$rtc(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x0, 0x0, 0xa}) 01:00:51 executing program 5: syz_io_uring_setup(0x13af, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) 01:00:51 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$incfs(r0, 0x0, 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, r4, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r2, 0x0, 0xffffdffa) read(r1, &(0x7f0000019440)=""/102391, 0x18ff7) 01:00:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:00:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 01:00:51 executing program 0: syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000001a00), 0x391c83, &(0x7f0000001b40)) 01:00:51 executing program 5: syz_clone(0x61028080, &(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000340)="a02e0ef9ea2d35") [ 3248.879411][T31599] loop2: detected capacity change from 0 to 264192 [ 3248.882427][T31601] loop1: detected capacity change from 0 to 264192 01:00:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x1, 0x4) 01:00:52 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000200)=@md5={0x1, "a6ab1dd8489db54a96a23369229aceeb"}, 0x11, 0x2) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x80200, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) ftruncate(r0, 0x208200) r2 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r5 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0xc0}, r5, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) sendfile(r4, r3, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff6, 0x11, r2, 0x0) read(r2, &(0x7f0000019440)=""/102391, 0x18ff7) 01:00:52 executing program 0: sched_setattr(0x0, 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020fffffff600000000b91e1d14000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1101000000000000000001130000000022001701", 0xa0, 0x8800}, {&(0x7f0000014600)="2200170100000000011700080000000008007809140b2a3a0802", 0x1a, 0x8b800}], 0x0, &(0x7f0000000340)={[{@utf8}]}) 01:00:52 executing program 0: socketpair(0x2, 0x3, 0x0, &(0x7f00000000c0)) 01:00:59 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 01:00:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 01:00:59 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x1ec4, 0x0, 0x0, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_NAN_FUNC={0x460, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SERVICE_INFO={0xf7, 0xb, "e790f484b4ed01e544880cdadb66ca03b6eee3fbdb4e156b57b58abb201986f153af369f6dd6ebb5fabff4d67bee8b29dc6ad9c46f1db5dc2d24ca40367915ba52a3fbf484cd0b3c70b2836440f40c97fa34ba1933aad3e97f796d317d8cb6e61a7654f81517cb08e7280a95c1a0550d4739aea4a40c48fd64d7ee3898dac29bc204b7607b3ad5f4eee0a521b945fa7c0366e3fd2d984b85aeac31fe1c734457a0df42edc095e8c6cb98fa6e4db2d24cb0c7522098bbb01361c6050c269aa5f25bf1d341bd95eea35257ef1e19c7625d8cac1c13b0d08b9daea4bd1ee49a397ae4f5f41ed4dd8cb6e4d89df72d0a8a28bc49ad"}, @NL80211_NAN_FUNC_TYPE={0x5, 0x1, 0x2}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0xf4, 0xe, 0x0, 0x1, [{0x1f, 0x0, "c7dc348e0fca3c03bb16f2fefa91944c5bf1c9116cfc4ee79637c0"}, {0xcd, 0x0, "d3560653b50574ff2f84aa4227dd21d68cff223e462eebb55bf7f4558da89af3b73a530164e8f98b5d9ffed7bdcf67f03bbdee0300449a49a152cdd64bd7f2364fbb674872516b6c7cf6af6be270d6b9fe9f7d65ea5be703c7ca9021ae5cc8a813185ab572375fb416d1dec75e40d1a2f903b59cd0565829fd3417d0b53761469f9d76ba5a4bf1b15872b58d9f46a156825ec75e1e903583704d024f1658ac923288322099d9d7d161119b865f0b489e8f75b9f022bc35ff1bab4b24fe474f67b17b446fa94e371599"}]}, @NL80211_NAN_FUNC_SRF={0x260, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_MAC_ADDRS={0x4c, 0x4, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}]}, @NL80211_NAN_FUNC_TYPE={0x5, 0x1, 0x1}]}, @NL80211_ATTR_NAN_FUNC={0x294, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_PUBLISH_TYPE={0x5}, @NL80211_NAN_FUNC_SERVICE_INFO={0x7d, 0xb, "646efb9b883c398f98aa9fde466d83fdd2100c7f1f2a0a95d14a55ad73a401d1459143c690480cbd8a397f3cf677d3b7961cbf74e50d6fd3255c546380da271fac90c025c9bdba703820c8eaacb0eb75782b410c51c53efb84cc39ff540fc357a073d7ea040d9afd7ea9577a77d3eead2245170f36766a16d2"}, @NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}, @NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}, @NL80211_NAN_FUNC_INSTANCE_ID={0x5}, @NL80211_NAN_FUNC_SRF={0x1f8, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_MAC_ADDRS={0x10, 0x4, 0x0, 0x1, [{0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_MAC_ADDRS={0x34, 0x4, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_MAC_ADDRS={0x40, 0x4, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_NAN_SRF_MAC_ADDRS={0x1c, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_MAC_ADDRS={0x4c, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa}]}]}]}, @NL80211_ATTR_NAN_FUNC={0x34, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5, 0x7, 0x99}, @NL80211_NAN_FUNC_TERM_REASON={0x5}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "e7f6fd94a0b4"}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "666a1c88a460"}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5}]}, @NL80211_ATTR_NAN_FUNC={0x12ec, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SRF={0x20c, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}]}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "4cbbfd335568"}, @NL80211_NAN_FUNC_SRF={0x10, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_BF_IDX={0x5}, @NL80211_NAN_SRF_INCLUDE={0x4}]}, @NL80211_NAN_FUNC_RX_MATCH_FILTER={0x107c, 0xd, 0x0, 0x1, [{0x1002, 0x0, "7ab0517b5424950f15c952f7b59327ab1152981b565d3037ab4dccf04bc54ea75fffbbe48790382c97f69abb744afe2c495ccc7ffcf8c97f63506060ac68e3810c3852d59f9b81a7f37e6e99fa332115e83b08e6388f4c3cdc2ca1e6c86beaae794491bedc175a8ad3048f89e08ee093f17d6f42f04312941d84f6b3f23af269f11fb51385781bbe07023027aa7d715769760cdd1494b8abde22df25e75b1479664ea7d53321b8e4ded5245c5c62b15b8a8c38a65e3a8fa5727926ac8588888b30e1d6d54a9bca16c6a94b604f610aad6827ffd254f149d125d2b92aad82f80b99817dacfac616b619bc0b54412a794be6fba4dfc9cc6755ccdb2f619b3c0d44948da43a2e4df0cf93d3557918f8217650b3ea255ff4bcc4ae3cbd161ab85d67fee27c5845904613a8d8878498639886f528883f286a399193921f974015b2e859b005df39e521cc5aec2b19cb78b442551f4b8e74b11dab457a44ccbf65ae5f479975dd720fcf775f03fabb448320a68f0456e72271b3c01fcef2a90b2c42393040fe4c4e44e6af8eb45aae352d27b3f6ff3abf0f910143cb7596da84b75c23783122f166e9540ab710c7d4e2cccaeb5c32330f0adaf9e9845aded7d29201b6664b5bf3bb5bbe9930987bf8ccebfa8031225650d9f1de9f56454373884315cbad347643a0e55118ed2859ea45a9039c6e25758613b563046b4d82ac94e705852c199e915e757eb0659b3e9f4fd1e019685d80d8af47529bd1e951aa280b65c2fd7556fb9ec87311d64293bb10f7712f75eef56df1e1af281de911793de41f95ba4a903ca791555fa870325d8dd01f201b6d5630bf878f32dd28fe8914ff3a2ef2a69aa0b20ac032749871fa60e711c0b2dfb4cc3aa3467ac52cf44681932b7fa64be8de785a9e4bb7b98a67f409588b95fcbffb4417c34a00ee15071719af33eb48d5d95a9139f5c1390e910da5cd445f80185b80b225303759f68f40cd7b4430eef010276564cced14e3bf65b225f234d68e4b36cdf0dc1d264c6e32be55eca0e736dcc8f4b0e5a1866ceef0f99b7e41ba128ad758912f3acc4e4046592269eb16fba9a8cb9942d98fa9df0f46428f1165c0fccbee1af0298b47c328d75d10fa3f32ca74795e18451c49a00b33b9cde9fc48aaece79999e48f6c403e09030ab1f39bef330798c8e5293d52a4b63005915e2959090fe7213bd7d1cd999a15b3aebfa7857eaf56220533a1168135758be1ddcbfa946fce6e6f32af8cb2be4e0fa22e38f95c81b7ee524db08ca9191920a82f8a1049b1ec31ddd650cb7ca6f1b23c9bdcf8e165e31d362b07e07fcb5c045236d74a8a773c7f6f0606cef7bc0515ddd45d8a6a4f2a853431143a1360730a4887d61382da25839be0bdefeba7ec56333322dc8f1d7d7e9178d5829b59714becdaa6466eca387b5a3861f1a54c1d13b064ac79742b63484001a1300d11457f9b1e250583a1b41e9cb7677b7111fda9db6d597b588a884a89a48313ae22588e33518f0bbc5219b45d898fd2e421fe6702603fe8903e0086c13d7ab1e941a671302679aea5970b031568d6d13aa93b5d1f2fef88cf87bf4cbc7977209f7ab37e102f9857ccd14b280c56deca22e7f8730037d869c20880a5b102eec08424edc3fe979c29db0caad5d763c6ed71c8afd36a396b31a29e1194a11033de9c9bc70d1f93cc9b807097c14634b51ce0baf94faaedd789544baab017e10067b5097cb7f492a1982eb1c9efb1287795cd3edf1a5530654e6e2026dd3d2647b2f844338153f22e67f453677e6da680ec9b4b8d5c94c1b401d7a7c0fab569ca6e9673917d94c8c02c2b9a5c9aa13691e1fe8855756d8c2f4c6ae76ea2328076cc2e9703317f6ab890494966a671d612b5d2030ff8766a2d58006d38bb3bca7780cb7fa0402215eb1741216d3a53107ec00b0caa91882bcf227a3ed9e593bf47e6177c394dc3df2cbb76e978e8d8043d9ff8fc8baebd43fa0cd12ae9904456f7eafddcb5e16f48e2c5515ca264341d432cc9872e9fb69987d03173d490ff15b66aa3a1ce40329493744189c04c6c72ddcd79b24f76cdc7184a4ad7939df5e74b36515645da2c75e76cf923ba1ae3c76db32504191ee62d8cfd1ae59f1c3d61b421afe75e8749e041ae005a5103b38ef1c458eaf7701d30eb0fcdd7719daa7587ffb8f74fe0936c0b3f7813263000bc38c12b9c896e52f2532a7c561f90ccb671a54172929dfd439fb127906b0983ef6f62741aed3764a24648adc7c7f81f4758ae0f434ffbd31db09b2238e992f39cbb1dcce99351a4ce8e5f43a469ad3cf4418cd2518b46b0ad3152c32e5c759dfa3ab8f7142615ba1c5b8445fe34028c5b18ecc2518bbe004d4fb65eeadf4719d428db0cfc43b742ae30720351e263a2afcf2d6d6ff95fc630472c673d77eaf8d5e6f114dfffed70211c62fc00d57dc5e4937c482d3060a5651ee51b96ff9ff4d4b16e1d4ac9461205dfaa7579c86b1dd187f1d713c817b682576709c4bb777f034f25ea5ebbc9c0b512e34d11eff213e76c8d6020f81603e9cb6b7f6599b7d25f9167b9b246f9cd6af5608a23c43e110123eecba7537e01f38b82dc4645d1b8444b3fe3208ce8ce63920dd14d6da830caa168a7a89c412a93093a9b1545359f9f34f4f99ca0e4bd871e8743e2329ffcbe0b52905e66281964fab9f99f3f0be4ced53f1427c7f9d2dffa9c3a31d18ef614c7684ffb46a57f73aca4ceaca5a5d89f11eaf0d24a01292da54f2496a51a129155f35aac3c65cd2dc67293718c36742170db391801818b9553c16a40220baa3fbbfe6d4d2cc2cd9cdd934b74e8ae8103838c79d3dbeda39f71ef10052644f5ecbeaf4ad22b388ef5ca300617defd8960fd517805b27fb03e5388dbde54ba8c366ef3c7b89fed5d532a536d0d5d5c65f1b5e53faf96c5de1c34164212028e9f1e95e2beff8c736fb5d6ef83443da7057eb448f2e4c63aab8df0a5677b6282336c66fb2641a8d6c91011936822512136228ffa539e18b97115a2d7120db3efaa269eecec497c3351c9c6979a6912335b347f36ee1accb81a6d8f770f192f0cc1567316b2a7c5c43c7190222ca63b547e66763b833d32aa48c6bb596b96a4c4ec314e212e40ce1d1ed9c9c8880d2999b6cdae21ddeefde1335b8c0917fd1fc92ab5ad422cc55eb22fbce816f0c7b6bf06e4f7b3139362e6de282123927f7675099aef46de0592dc3bf256cfdaef4d40191dc7caab8e8a6ee7bf67ce82e97b81ac598d6bc1716578b0f86abac652c94c8f732782d2c6a60f0f7ab62653438b2340f96efd12700f3c2bfd014fac42b2f763518cb32d87459f784e604b694bb05a798c708b5bbbfb7dbd03f4fa6922f3e28682925059e10b698bdbf45fa457156508a3afef1b4bb51ba23c81223cacc4854e3b8e589e33434a9e462951ba5ea824347f224ade4298cdaba5ef6bbd55eae7500d9557373e909427cf7f6270994e6c1f1fce1ee41f7f5c3d5100576fb0cb4363202548bdce258ba43d600caabbac2557c1203f80431617462e1586a856080397fff5c26af4be31912a582348c255acd3cd4d47ae5939e2598acdefcf37254f151b85df192806bb0ae0427b66800a5fd16e112277e7f3589bad31fb3f0f1fefa31c34c683c2f3f00e03bad5fbe85e738b4b7295d0ff8974acec0e019b3bf10d26c486e7d1ee5eb3dc9ded1155d386a7e32100d78659bfd494437f6662474839bb77dee8910e3aacbb108bcfd9bedd8018f5755a09f8cf69bdb62e616d02b47b56be89ef9eb1119337d753c4353f3b64a4e41e4c582ba6b2ff7436ac96f806ada3e8c7152fa57d435b9c4b57e71fd81d54b608bc99e01559a43962e784c1bb858eae1a21bcfcd8f072e028136422a0756a020c11913a0276556bd4fb76bdee085ad7f80f594cfb3085d6a625a0d862ca5a0b16a76a2fb8fba3224c85c98416d3124a09d085e10481a815e4388674fc1180633cb31fe7452594d3a8ca888f19c02d8090ee1075c927b328b649f85fd84aa4515e618ce27522adf71aab9cb1a8645883ff852932e6679dce0fa18112b1fba7150b64ec63ca99a5326dc701a3149fc5abecac6511c7a794fc120250dec9f49348e29f5af686eaa526cb5122a30b6df440784821b008dee373dd81a4f825f475c4bc9c5faeee3d9039270006e8369eb530984bd49ecb1f0160c09ff846527f3a137323d02a223a464f97b57adb015fa0e707629da449a0349898073f9a27c4293d9d356d72187b2df30365bf29a8eeb1f95aab44d485a0bd7ebc8e591ee223877d22d651f11aa7d67541637b8ac0b3d8ef624ee5fac3e0ca2284bd1f18f036f3e169edf0043d42d3a86d54e951b85f32a5abfa824472ea63f5e0538635b571824dbf1032278d0f56c9ae5f9f01636f4a9913c8554a14064c061a626df25d7c32a5cbaddf631440f26abedfd9a761c6162df5248cf31ed479e8add3470b02e60dd6cd649459696254c5f7521170cd6c11c70f66624ee794ee60fbc63a801796b966d54848aa24b5cbf27578bd95054cb9fbac8d8bbe61cada7e4b7cd38c8f1ac0b6081ea493725f6381c723e740800ef718fc04320bd7dd4bd21f7173575b1a551642105b6c0d065762f90509f3157d82b32d3ce77f05505281b738a4fb8d4cd3cf46b2d6eb878515f32b528660cc850b4f92517ccf35754421cc298353a81469e1abfb2efa53681a2d09097fda9e7ee40d0326eac9f5b022fcbcd17689c723613fb73c3584bac85637f05711753d0f497b5c195d2d5813e5fcee4e3702ccbd7a60407df80e45b729998be4e784c670c73b76508ee3e4bc55d7a34454d5b8e22953e0150bd219b3a822b2366261cc2f669dc5deda5d811d8a0a0fefb1e9ba71bd6f299b49d770948b080b9877e2e56f1ab8ecff7a2e11c183da93f68b6e90ad62c45f99f0565707fd47464c1fe82c55c5ac626d306b3b065c75831701b0351356dab757fbb8f67c03162442147ec4505acd5e63c1644bf17a34e49efe2fe78a413e4f8dead5bc96897a81be20db99437d6b1b1a50a10a89e5d5922399d9e006997f73637c9e097cc5dbd7470584b349fc7143499f779b8800b23448a3a69ec8bc82437098024522a326617cfb1f78781cbceafc11ba24784712c64a76f398c58c6b52ae0a77d52f88276069d9f7b5a4acddae2677bcef10d9ae56aafcd7baba5130296655cc26b865c22b8c950c34eb87d44e63597ebd7da98976396c17d34f7d26adf706676dd7e6396aaef11459040bd1387fe55ddebd9aa66b798bd55f1715e566cb628f6e042c41ba6d9ded35a7da57e8ec8d0f2bd1efab1a8e5822ce3a2b9311f6c79ace8fcc53c79487cf1d46db664119a5e24de4dcffdd5fc32b157db63015a70de51916e3efada133037ca186eecbdb4b4c9f9615d4f6554bb0f559f9858abfaec3016e0aacf979641ae7d71e9584a56f537c554ee54c4a9e609e085f3e819eb6ad7ef3ebfab83e3cb923217be9be2af09e5298a45b5f0677886c4c47626fc1e79940396b72654daa4279a3141fbdce7d40ed19515451e3bd820c1f8558d8dd21cb24093de3b7d6859b569fc8545613304a7c48b42294a2165c30962a3f1183e8144613b499e087aeaa271ccada3f0a255e7a53d4d588a1b1bdd1d4654c4e308e2b150756258a52fd514626528c36f4af474cc4dbcf850e4256cf5efaba6cf3bea7c3d3f3a2e17def245235d7f172eb5448b7589adb43787e4140dbb604018af01676d9ece8985542a89b3036a22f90d51f"}, {0x12, 0x0, "c4b0de65e587bc31a2549dde5b21"}, {0x5d, 0x0, "f3ba2be9c95de38dc4fb2a9a2d3eb2d6ec7f5e65d0806c732760c963b1f9d5bea14302019ef827cf98b66e24446560cb77a900ac35dc12251a7fe110cce9b7627dbf63f222250ffd96fe278b4812228883396c87bcb3f4289c"}]}, @NL80211_NAN_FUNC_TTL={0x8}, @NL80211_NAN_FUNC_SERVICE_INFO={0x25, 0xb, "0bc5ef16756d206f159e8fc18fd54c52153b233e0c8c8d267ae4567b466fb3881c"}, @NL80211_NAN_FUNC_FOLLOW_UP_DEST={0xa, 0x8, @broadcast}, @NL80211_NAN_FUNC_CLOSE_RANGE={0x4}, @NL80211_NAN_FUNC_CLOSE_RANGE={0x4}]}, @NL80211_ATTR_NAN_FUNC={0x1bc, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SRF={0x90, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_BF_IDX={0x5, 0x3, 0x4}, @NL80211_NAN_SRF_MAC_ADDRS={0x34, 0x4, 0x0, 0x1, [{0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_MAC_ADDRS={0x40, 0x4, 0x0, 0x1, [{0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_BF_IDX={0x5}]}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0x114, 0xe, 0x0, 0x1, [{0x4a, 0x0, "f8e979390bb1314f1753ba55f97896b0aa224bca48e009a4f3ef9261ac49ac7f49d2ea8cdee16729ea65af291b1782e7d470ccbaeac5ca542ca6c2f5a0434ab1097a6530d76a"}, {0x65, 0x0, "602dd10977fb180e6267a7a72df28de9dc0a9841723ab706792a4712675725d3b03f1f75b06814a045defcdf35b58d690d117bce1b16182edc1dafc1d623bc7e46f8008cc88f99f4ea84d345eb068a7014de57cc18fce4a586e7d68af194921087"}, {0x59, 0x0, "d3ecad8f23d63e1eb3d41ca972784b0d6c9645cd06dbb88fd8063df18af7bce03eaa9b900ed7cd14f3731aa53bf25dabab98fb1e1213fed62a370ba95f7570c7123d4c911ed96c09fea364ba27daf4a46645a34190"}]}, @NL80211_NAN_FUNC_INSTANCE_ID={0x5}, @NL80211_NAN_FUNC_CLOSE_RANGE={0x4}, @NL80211_NAN_FUNC_TYPE={0x5}]}, @NL80211_ATTR_NAN_FUNC={0x30, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_PUBLISH_TYPE={0x5}, @NL80211_NAN_FUNC_FOLLOW_UP_DEST={0xa, 0x8, @broadcast}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5}, @NL80211_NAN_FUNC_TYPE={0x5, 0x1, 0x2}, @NL80211_NAN_FUNC_PUBLISH_TYPE={0x5}]}, @NL80211_ATTR_NAN_FUNC={0x2a4, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_RX_MATCH_FILTER={0x290, 0xd, 0x0, 0x1, [{0xbd, 0x0, "9604a295464d143d94268b575d69487ec0a23b9e68004fe8e8556a58c4cbd70eb72c1e8c5905a5aa73883562c3451f36964dfd26e418937f2c813a15dfa456f6978aef1ae1060d0c567f588e46240906f323806eb0ad17b077024551e63544ebffc70079869278dfb19ca698435e8dc973ac6a024d985f82d2680b136846b653ea936cd06770685b33e5130864d08f28b27c3ea254db5cbf0bc20b8f4eed8cd70792d31881081e8e30d852f4d81e9105ff80d69e1c4cd8af64"}, {0xd5, 0x0, "c3770b9c125b9c0f0b3a546922abe517fc28af78d357d085928e67af7be9068df63cc9b551d924b379eb9a80f1a497b4df5132c6fcf5007882f0b433da8e851a8f4c58c38f67e187761d52478de373efdde1cfea7650f2082d278838a10ae99251aa2e1a7fd0293a4e987f857047b3ac7f83e609522359d150367ed6a60df628b1fb7ed490aa87d6a258049f760c765f6e92a3fe7d49aeb43a490c416a51bc4a792eda86e8dbf52a17ce2818022554b99b68dca0be658e5715672a0fa654da5be589c499de6a482059f5258a596046421c"}, {0x45, 0x0, "ae46396f841d43275c40af61e3293bb1e6b0a0541c17c7c0f85b5db5536f55f4cb1e54ae90138cf3adae72f822ab89e21d7c6a466c9cb901c9c34d6fc87c510637"}, {0x21, 0x0, "ffbc371b0d237ef0cba4a4a16585a520113756b13a7d6416714497c407"}, {0x2d, 0x0, "266b633ba3b912ac43634275af9168ebe405198aa3891e205f9a9f5567127e6fda0e0d5e98860ecf60"}, {0x55, 0x0, "2996da83b58966503e7a4181b8001451d37cd335ba289cc813c8b3c94868d9b46700cdebd3f06c5261bac70c641028ea4b928743dac6a169aab3cf7cecb5cc438737c4de808127ede4da340ce6baf435a6"}]}, @NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5}, @NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5}]}]}, 0x1ec4}, 0x1, 0x0, 0x0, 0x4081}, 0x40080) 01:00:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:00:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 01:00:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000440)={&(0x7f0000000180), 0xc, &(0x7f0000000400)={&(0x7f0000000200)={0x64, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2}], @NL80211_ATTR_IE={0x24, 0x2a, [@perr={0x84, 0x2}, @ht={0x2d, 0x1a}]}, @NL80211_ATTR_VHT_CAPABILITY_MASK={0x10}]}, 0x64}}, 0x0) 01:00:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x40, r1, 0x903, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_PMK={0x14, 0xfe, "16de0086274935d787df5a0039f326e7"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x40}}, 0x0) 01:00:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 01:00:59 executing program 0: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000002c0)={'sit0\x00', 0x0}) 01:00:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, 0x0, 0x0) [ 3256.079161][T31636] loop2: detected capacity change from 0 to 264192 [ 3256.087935][T31637] loop1: detected capacity change from 0 to 264192 01:00:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000fcdbdf255a00000008000300", @ANYRES32=0x0, @ANYBLOB='\f'], 0x28}}, 0x0) 01:01:06 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x17b00) 01:01:06 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 01:01:06 executing program 4: getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) 01:01:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) 01:01:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 01:01:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16=r2, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b2900) sendfile(r4, r3, 0x0, 0x8000000000004) 01:01:06 executing program 4: socket(0x22, 0x0, 0x2b) 01:01:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, 0x0) 01:01:06 executing program 5: socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 01:01:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000fcdbdf255a"], 0x28}}, 0x0) [ 3263.199158][T31664] loop2: detected capacity change from 0 to 264192 [ 3263.203724][T31666] loop1: detected capacity change from 0 to 264192 01:01:06 executing program 5: pipe2$9p(0x0, 0x104800) 01:01:06 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000029c0)={0x18, 0x1, &(0x7f0000001800)=@raw=[@jmp], &(0x7f0000001840)='GPL\x00', 0x6, 0x1000, &(0x7f0000001880)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 3263.314677][T31686] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 01:01:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:01:13 executing program 5: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 01:01:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_NAN_FUNC={0x460, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SERVICE_INFO={0xf5, 0xb, "e790f484b4ed01e544880cdadb66ca03b6eee3fbdb4e156b57b58abb201986f153af369f6dd6ebb5fabff4d67bee8b29dc6ad9c46f1db5dc2d24ca40367915ba52a3fbf484cd0b3c70b2836440f40c97fa34ba1933aad3e97f796d317d8cb6e61a7654f81517cb08e7280a95c1a0550d4739aea4a40c48fd64d7ee3898dac29bc204b7607b3ad5f4eee0a521b945fa7c0366e3fd2d984b85aeac31fe1c734457a0df42edc095e8c6cb98fa6e4db2d24cb0c7522098bbb01361c6050c269aa5f25bf1d341bd95eea35257ef1e19c7625d8cac1c13b0d08b9daea4bd1ee49a397ae4f5f41ed4dd8cb6e4d89df72d0a8a28bc"}, @NL80211_NAN_FUNC_TYPE={0x5}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0xf4, 0xe, 0x0, 0x1, [{0x1d, 0x0, "c7dc348e0fca3c03bb16f2fefa91944c5bf1c9116cfc4ee796"}, {0xcd, 0x0, "d3560653b50574ff2f84aa4227dd21d68cff223e462eebb55bf7f4558da89af3b73a530164e8f98b5d9ffed7bdcf67f03bbdee0300449a49a152cdd64bd7f2364fbb674872516b6c7cf6af6be270d6b9fe9f7d65ea5be703c7ca9021ae5cc8a813185ab572375fb416d1dec75e40d1a2f903b59cd0565829fd3417d0b53761469f9d76ba5a4bf1b15872b58d9f46a156825ec75e1e903583704d024f1658ac923288322099d9d7d161119b865f0b489e8f75b9f022bc35ff1bab4b24fe474f67b17b446fa94e371599"}]}, @NL80211_NAN_FUNC_SRF={0x260, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_BF={0x103, 0x2, "48846de1af03efbe1040c2d9ec4cd424ba162325ba118773e717fbc157140e25bdceb897ce6dbb372528ffa2f6e835e33ef38b9d843bb2b5f8feb331de0c3e64ac34604549933eedc59e8880402b11dc8d596c264c1563851e2cc0aedfcaa55f5b75f0abf0e844cca6237cb897da01c5d6322b097cb3ca07f6279c0f365c351f0c586c76681ae51adcda43b81c4b8ac7a26d833610919f5c2af54c4af482b0e3cd977dd0c0d94008dc8e3e292368af6c1b5fd3484aa4dac55ee3d6fe6b74b9bdf54e9875926605b9401832ee585d5e915a36d6947a1dfdb1c609f9eb5e212210ffff0ab08ee4109cda21d5f045a102ae3265df1390f558fa6914b622144ed3"}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_MAC_ADDRS={0x4c, 0x4, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}]}, @NL80211_NAN_FUNC_TYPE={0x5}]}, @NL80211_ATTR_NAN_FUNC={0x28c, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SERVICE_INFO={0x7d, 0xb, "646efb9b883c398f98aa9fde466d83fdd2100c7f1f2a0a95d14a55ad73a401d1459143c690480cbd8a397f3cf677d3b7961cbf74e50d6fd3255c546380da271fac90c025c9bdba703820c8eaacb0eb75782b410c51c53efb84cc39ff540fc357a073d7ea040d9afd7ea9577a77d3eead2245170f36766a16d2"}, @NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}, @NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}, @NL80211_NAN_FUNC_INSTANCE_ID={0x5}, @NL80211_NAN_FUNC_SRF={0x1f8, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_MAC_ADDRS={0x10, 0x4, 0x0, 0x1, [{0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_MAC_ADDRS={0x34, 0x4, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_MAC_ADDRS={0x40, 0x4, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_NAN_SRF_MAC_ADDRS={0x1c, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_MAC_ADDRS={0x4c, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa}]}]}]}, @NL80211_ATTR_NAN_FUNC={0x34, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5}, @NL80211_NAN_FUNC_TERM_REASON={0x5}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "e7f6fd94a0b4"}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "666a1c88a460"}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5}]}, @NL80211_ATTR_NAN_FUNC={0x784, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SRF={0x20c, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}]}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "4cbbfd335568"}, @NL80211_NAN_FUNC_SRF={0x10, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_BF_IDX={0x5}, @NL80211_NAN_SRF_INCLUDE={0x4}]}, @NL80211_NAN_FUNC_RX_MATCH_FILTER={0x558, 0xd, 0x0, 0x1, [{0x551, 0x0, "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"}]}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4081}, 0x0) 01:01:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000004c0), 0x4) 01:01:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 01:01:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:01:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000fcdbdf255a00000008"], 0x28}}, 0x0) 01:01:13 executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 01:01:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) [ 3270.318852][T31697] loop1: detected capacity change from 0 to 264192 [ 3270.337007][T31698] loop2: detected capacity change from 0 to 264192 [ 3270.343652][T31705] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 01:01:13 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000b00), 0x4) 01:01:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000fcdbdf255a0000000800", @ANYRES32=0x0, @ANYBLOB="0c0099"], 0x28}}, 0x0) 01:01:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x420, 0x128, 0x238, 0x0, 0x238, 0x128, 0x598, 0x598, 0x598, 0x598, 0x598, 0x6, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'wg0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xc8, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@ah={{0x30}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0x2]}}}}, {{@ip={@empty, @multicast1, 0x0, 0x0, 'tunl0\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@broadcast, @broadcast, 0x0, 0x0, 'veth0_to_team\x00', 'veth0_to_hsr\x00', {}, {}, 0x0, 0x4}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) [ 3270.462742][T31715] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 01:01:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:01:20 executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, &(0x7f00000001c0)) 01:01:20 executing program 0: syz_genetlink_get_family_id$smc(&(0x7f0000000300), 0xffffffffffffffff) 01:01:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 01:01:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:01:20 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x0) 01:01:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x420, 0x128, 0x238, 0x0, 0x238, 0x128, 0x598, 0x598, 0x598, 0x598, 0x598, 0x6, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'wg0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xc8, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@ah={{0x30}}]}, @common=@SET={0x60}}, {{@ip={@empty, @multicast1, 0x0, 0x0, 'tunl0\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@broadcast, @broadcast, 0x0, 0x0, 'veth0_to_team\x00', 'veth0_to_hsr\x00', {}, {}, 0x0, 0x4}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) 01:01:20 executing program 0: socket(0x18, 0x0, 0x1e0) 01:01:20 executing program 5: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='./binderfs/binder-control\x00', 0x0, 0x0) ioctl$BINDER_CTL_ADD(r0, 0xc1086201, &(0x7f0000000200)={'binder0\x00'}) [ 3277.437961][T31726] loop1: detected capacity change from 0 to 264192 [ 3277.448145][T31728] loop2: detected capacity change from 0 to 264192 01:01:20 executing program 0: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x99558042b4613d8f}, 0x14) 01:01:20 executing program 5: r0 = socket(0x2, 0xa, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) 01:01:20 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r0) [ 3277.667589][T31749] ================================================================== [ 3277.675715][T31749] BUG: KCSAN: data-race in do_mpage_readpage / generic_write_end [ 3277.683452][T31749] [ 3277.685774][T31749] write to 0xffff888145011978 of 8 bytes by task 31728 on cpu 1: [ 3277.693488][T31749] generic_write_end+0x96/0x180 [ 3277.698352][T31749] fat_write_end+0x4a/0x160 [ 3277.702863][T31749] generic_perform_write+0x261/0x400 [ 3277.708144][T31749] __generic_file_write_iter+0x195/0x2b0 [ 3277.713782][T31749] generic_file_write_iter+0x75/0x130 [ 3277.719157][T31749] do_iter_readv_writev+0x2de/0x380 [ 3277.724364][T31749] do_iter_write+0x192/0x5c0 [ 3277.728955][T31749] vfs_iter_write+0x4c/0x70 [ 3277.733458][T31749] iter_file_splice_write+0x43a/0x790 [ 3277.738842][T31749] direct_splice_actor+0x80/0xa0 [ 3277.743788][T31749] splice_direct_to_actor+0x345/0x650 [ 3277.749169][T31749] do_splice_direct+0x106/0x190 [ 3277.754028][T31749] do_sendfile+0x675/0xc40 [ 3277.758449][T31749] __x64_sys_sendfile64+0x102/0x140 [ 3277.763652][T31749] do_syscall_64+0x44/0xd0 [ 3277.768076][T31749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3277.773974][T31749] [ 3277.776296][T31749] read to 0xffff888145011978 of 8 bytes by task 31749 on cpu 0: [ 3277.783925][T31749] do_mpage_readpage+0x160/0xfd0 [ 3277.788895][T31749] mpage_readahead+0x188/0x2c0 [ 3277.793665][T31749] fat_readahead+0x18/0x20 [ 3277.798136][T31749] read_pages+0xba/0x5f0 [ 3277.802384][T31749] page_cache_ra_unbounded+0x16a/0x400 [ 3277.807852][T31749] ondemand_readahead+0x4f8/0x700 [ 3277.812883][T31749] page_cache_sync_ra+0xaf/0xe0 [ 3277.817743][T31749] filemap_read+0x3ed/0x1430 [ 3277.822359][T31749] generic_file_read_iter+0x72/0x320 [ 3277.827658][T31749] generic_file_splice_read+0x24f/0x330 [ 3277.833305][T31749] splice_direct_to_actor+0x2aa/0x650 [ 3277.838685][T31749] do_splice_direct+0x106/0x190 [ 3277.843543][T31749] do_sendfile+0x675/0xc40 [ 3277.847963][T31749] __x64_sys_sendfile64+0x102/0x140 [ 3277.853170][T31749] do_syscall_64+0x44/0xd0 [ 3277.857591][T31749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3277.863493][T31749] [ 3277.865811][T31749] value changed: 0x00000000000a5000 -> 0x00000000000a6000 [ 3277.872906][T31749] [ 3277.875225][T31749] Reported by Kernel Concurrency Sanitizer on: [ 3277.881415][T31749] CPU: 0 PID: 31749 Comm: syz-executor.2 Not tainted 5.17.0-rc4-syzkaller-00002-gd567f5db412e-dirty #0 [ 3277.892437][T31749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3277.902492][T31749] ================================================================== 01:01:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:01:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0xfffffd59}}, 0x0) 01:01:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000fcdbdf255a000000080003", @ANYRES32=0x0], 0x28}}, 0x40840) 01:01:27 executing program 0: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), 0xffffffffffffffff) 01:01:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 01:01:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:01:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_NAN_FUNC={0x3e8, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SERVICE_INFO={0x7d, 0xb, "e790f484b4ed01e544880cdadb66ca03b6eee3fbdb4e156b57b58abb201986f153af369f6dd6ebb5fabff4d67bee8b29dc6ad9c46f1db5dc2d24ca40367915ba52a3fbf484cd0b3c70b2836440f40c97fa34ba1933aad3e97f796d317d8cb6e61a7654f81517cb08e7280a95c1a0550d4739aea4a40c48fd64"}, @NL80211_NAN_FUNC_TYPE={0x5}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0xf4, 0xe, 0x0, 0x1, [{0x1e, 0x0, "c7dc348e0fca3c03bb16f2fefa91944c5bf1c9116cfc4ee79637"}, {0xcd, 0x0, "d3560653b50574ff2f84aa4227dd21d68cff223e462eebb55bf7f4558da89af3b73a530164e8f98b5d9ffed7bdcf67f03bbdee0300449a49a152cdd64bd7f2364fbb674872516b6c7cf6af6be270d6b9fe9f7d65ea5be703c7ca9021ae5cc8a813185ab572375fb416d1dec75e40d1a2f903b59cd0565829fd3417d0b53761469f9d76ba5a4bf1b15872b58d9f46a156825ec75e1e903583704d024f1658ac923288322099d9d7d161119b865f0b489e8f75b9f022bc35ff1bab4b24fe474f67b17b446fa94e371599"}]}, @NL80211_NAN_FUNC_SRF={0x260, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_MAC_ADDRS={0x4c, 0x4, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}]}, @NL80211_NAN_FUNC_TYPE={0x5}]}, @NL80211_ATTR_NAN_FUNC={0x294, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_PUBLISH_TYPE={0x5}, @NL80211_NAN_FUNC_SERVICE_INFO={0x7d, 0xb, "646efb9b883c398f98aa9fde466d83fdd2100c7f1f2a0a95d14a55ad73a401d1459143c690480cbd8a397f3cf677d3b7961cbf74e50d6fd3255c546380da271fac90c025c9bdba703820c8eaacb0eb75782b410c51c53efb84cc39ff540fc357a073d7ea040d9afd7ea9577a77d3eead2245170f36766a16d2"}, @NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}, @NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}, @NL80211_NAN_FUNC_INSTANCE_ID={0x5}, @NL80211_NAN_FUNC_SRF={0x1f8, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_MAC_ADDRS={0x10, 0x4, 0x0, 0x1, [{0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_MAC_ADDRS={0x34, 0x4, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_NAN_SRF_BF={0x103, 0x2, "19c8d8385c0e55e91da82118263f49a045ed29da34b87b17e4789809e8567b5eb038a192540fb212943d113a155abf1c603f0fc1180edf9a2746601e44a7ea6d6d84cfff97f6c31a366d4cd0a5e48a6d0c45afc82852a0f69afc8df29c77d68eefa4021c6ffbf905f07929a8b1ed6e4a9568bc0bf383a9973d8e177fa4a7719ced3fb0ff1a2c7473d8ee3ffd09788b321a9f62fd5c4bf44a84ee888ef3f9dafb8b10f4a868b7b3fc8969bc13f6d878106f66f1b351319b8544dd65e53a24ec65bfdd773920444d9edd9356114e63a14236f99166d1bb41435a5d51669fc6f74fda8040bd9bdd1d22a86446d2c9cb1ee07ffeb35e088985a5faa635ad4299a9"}, @NL80211_NAN_SRF_MAC_ADDRS={0x40, 0x4, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}, @NL80211_NAN_SRF_MAC_ADDRS={0x1c, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_MAC_ADDRS={0x4c, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa}]}]}]}, @NL80211_ATTR_NAN_FUNC={0x34, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5}, @NL80211_NAN_FUNC_TERM_REASON={0x5}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "e7f6fd94a0b4"}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "666a1c88a460"}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5, 0x6, 0x8}]}, @NL80211_ATTR_NAN_FUNC={0x7d8, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SRF={0x20c, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}]}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "4cbbfd335568"}, @NL80211_NAN_FUNC_SRF={0x10, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_BF_IDX={0x5}, @NL80211_NAN_SRF_INCLUDE={0x4}]}, @NL80211_NAN_FUNC_RX_MATCH_FILTER={0x594, 0xd, 0x0, 0x1, [{0x58b, 0x0, "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"}, {0x4}]}, @NL80211_NAN_FUNC_TTL={0x8}, @NL80211_NAN_FUNC_FOLLOW_UP_DEST={0xa, 0x8, @broadcast}, @NL80211_NAN_FUNC_CLOSE_RANGE={0x4}]}, @NL80211_ATTR_NAN_FUNC={0xc, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_TYPE={0x5}]}, @NL80211_ATTR_NAN_FUNC={0x10, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_RX_MATCH_FILTER={0xc, 0xd, 0x0, 0x1, [{0x4}, {0x4}]}]}]}, 0xec4}}, 0x0) 01:01:27 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0xfffffffffffffe3f) 01:01:27 executing program 5: socket(0x3, 0x0, 0xa3cc) [ 3284.556856][T31759] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3284.573584][T31765] loop1: detected capacity change from 0 to 264192 01:01:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000fcdbdf255a000000080003", @ANYBLOB='\f'], 0x28}}, 0x0) 01:01:27 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={0x0}}, 0x0) 01:01:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x18}, 0x48) [ 3284.663992][T31775] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 01:01:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x17b00) 01:01:30 executing program 5: sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket(0x2, 0xa, 0x0) 01:01:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 01:01:30 executing program 0: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000580), 0xffffffffffffffff) 01:01:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x100}, 0x400c, 0x3, 0x4, 0x0, 0x1f000, 0x4, 0x401, 0x0, 0x3, 0x0, 0x100208}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 01:01:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb02623006250ca2934129796b66c280f1f35ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a060095e92b2dc0e75e37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a703890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c0000000000000000000000000000d443b3b6181849c845dd1bec54a175b9abe63b37582bdf7d2255115c0322c33f88119fba3bf4a5b97552064bda8664"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e7000000caed7bf8448e5269f1f3c35af138d3373b750dfb7ebf0be2baeb20cf6c979e3a717002677ff06dc585a9a67161f354e78ed08c97cede4222ccfb2508c90c6ef3cbdd157c18f6b2f1f6cb44f007ca0ac89436cc57253c5825098bea955011a1f059a2d4d708b71757e339b3892a2e15502c4e032b6d34dfef8492343f17e18b", @ANYRES16, @ANYBLOB="010029bd7000ffdbdf2502000000050004000000000006000a004e220000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 01:01:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x38, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}}]}, 0x38}}, 0x0) 01:01:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x7, 0x0, 0x0, 0x0, 0x210, 0x1}, 0x48) 01:01:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000001440)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}, 0x5c) 01:01:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x28}}, 0x0) 01:01:30 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 3287.572162][T31790] loop1: detected capacity change from 0 to 264192 01:01:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff)