, 0x4, 0x1ff, 0x0, 0x11b, 0x0, 0x57}, 0xffffffffffffffff, 0x0, r0, 0xa) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:15:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002cc0)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:15:57 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:15:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00'}, 0x10) socket(0x10, 0x803, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) [ 169.797407][T20836] loop4: detected capacity change from 0 to 262160 17:15:57 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x452, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = accept4$packet(r0, 0x0, &(0x7f0000000000), 0x80000) r2 = fcntl$dupfd(r0, 0x406, r1) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) pwritev2(r2, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1, 0x2, 0x5d30, 0x8) 17:15:57 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x452, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = accept4$packet(r0, 0x0, &(0x7f0000000000), 0x80000) r2 = fcntl$dupfd(r0, 0x406, r1) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) pwritev2(r2, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1, 0x2, 0x5d30, 0x8) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x452, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) accept4$packet(r0, 0x0, &(0x7f0000000000), 0x80000) (async) fcntl$dupfd(r0, 0x406, r1) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) pwritev2(r2, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1, 0x2, 0x5d30, 0x8) (async) 17:15:58 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x452, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = accept4$packet(r0, 0x0, &(0x7f0000000000), 0x80000) r2 = fcntl$dupfd(r0, 0x406, r1) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) pwritev2(r2, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1, 0x2, 0x5d30, 0x8) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x452, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) accept4$packet(r0, 0x0, &(0x7f0000000000), 0x80000) (async) fcntl$dupfd(r0, 0x406, r1) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) pwritev2(r2, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1, 0x2, 0x5d30, 0x8) (async) 17:15:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002cc0)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 170.085518][T21151] loop4: detected capacity change from 0 to 262160 17:15:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:15:58 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x67, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10084}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) r2 = dup3(r0, r1, 0x80000) open(&(0x7f0000000540)='./file0\x00', 0x880, 0x21) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, &(0x7f0000000200)) fallocate(r1, 0x18, 0x101, 0x6) pwrite64(r2, &(0x7f0000000500)="ea65601af6", 0x5, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0xd0100100, &(0x7f0000000580)="97a493e5a476ed5d9b4c6e0fa6fa4cfdf8", &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="fa641352637c37ec6ad156c9a42019bb697a026837c298370aa0780ee91fc1c4c1bdaab9196e6a") clone(0x8b01b8b4dcb40211, &(0x7f0000000240)="8abde9b8cfaebf66a99400514456f94e93af9090be97143e6915e38ed72f9568c472f452affd1fb9a79261b01a2158b9ec3ccf5ea7c8f4a9a59f47a5e176974aa51cc2e0d73e5663be1432645aa5cb10265030c06871734480367c5fdff0ead407345ead54f6114c3f790f39df6b1f2d6fc3c3e10d4a6d4e1e54aafdd1d2fbb1f312b756abfc73c6233a12f357fcc3b7cbfd76d93d0181f9a2e637ff6661df4fc9624aed89ca8356e8000000000100000074caae1dd03000"/196, &(0x7f0000000400), &(0x7f0000000380), &(0x7f0000000680)="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") clone(0x400, &(0x7f0000000000)="3342655f1b72661d107e15376a0351ea2c7a38c6d293aa7bda26e336847d6d6d60076c38c1c9f59c8ce4b77282a790dd2f6409feb30af4bf3a5eef2c329cab69302119afd122b63b98c338f9327731217d5f4b288358250da0f2056f691da54a75e1d53f8b3951655ddc7f390e7b20e10932a5de59980d072199c52bc5f42b84274fcf965567656e13f0896cfc9400a92c56fea114c73c532da61c40a76163d2e65f37963ac0", &(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)="764b48ebda5b40398f2b9d3508e09c4706f467d3376f6e03fa558457a8486a8a6ec37036395931b6551e2a8a70122921ca2429160828d495") 17:15:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002cc0)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 170.462112][T21256] loop4: detected capacity change from 0 to 262160 17:15:58 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:15:58 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x67, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10084}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) r2 = dup3(r0, r1, 0x80000) open(&(0x7f0000000540)='./file0\x00', 0x880, 0x21) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, &(0x7f0000000200)) fallocate(r1, 0x18, 0x101, 0x6) pwrite64(r2, &(0x7f0000000500)="ea65601af6", 0x5, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0xd0100100, &(0x7f0000000580)="97a493e5a476ed5d9b4c6e0fa6fa4cfdf8", &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="fa641352637c37ec6ad156c9a42019bb697a026837c298370aa0780ee91fc1c4c1bdaab9196e6a") clone(0x8b01b8b4dcb40211, &(0x7f0000000240)="8abde9b8cfaebf66a99400514456f94e93af9090be97143e6915e38ed72f9568c472f452affd1fb9a79261b01a2158b9ec3ccf5ea7c8f4a9a59f47a5e176974aa51cc2e0d73e5663be1432645aa5cb10265030c06871734480367c5fdff0ead407345ead54f6114c3f790f39df6b1f2d6fc3c3e10d4a6d4e1e54aafdd1d2fbb1f312b756abfc73c6233a12f357fcc3b7cbfd76d93d0181f9a2e637ff6661df4fc9624aed89ca8356e8000000000100000074caae1dd03000"/196, &(0x7f0000000400), &(0x7f0000000380), &(0x7f0000000680)="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") clone(0x400, &(0x7f0000000000)="3342655f1b72661d107e15376a0351ea2c7a38c6d293aa7bda26e336847d6d6d60076c38c1c9f59c8ce4b77282a790dd2f6409feb30af4bf3a5eef2c329cab69302119afd122b63b98c338f9327731217d5f4b288358250da0f2056f691da54a75e1d53f8b3951655ddc7f390e7b20e10932a5de59980d072199c52bc5f42b84274fcf965567656e13f0896cfc9400a92c56fea114c73c532da61c40a76163d2e65f37963ac0", &(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)="764b48ebda5b40398f2b9d3508e09c4706f467d3376f6e03fa558457a8486a8a6ec37036395931b6551e2a8a70122921ca2429160828d495") ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x67, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10084}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) dup3(r0, r1, 0x80000) (async) open(&(0x7f0000000540)='./file0\x00', 0x880, 0x21) (async) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, &(0x7f0000000200)) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) pwrite64(r2, &(0x7f0000000500)="ea65601af6", 0x5, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) clone(0xd0100100, &(0x7f0000000580)="97a493e5a476ed5d9b4c6e0fa6fa4cfdf8", &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="fa641352637c37ec6ad156c9a42019bb697a026837c298370aa0780ee91fc1c4c1bdaab9196e6a") (async) clone(0x8b01b8b4dcb40211, &(0x7f0000000240)="8abde9b8cfaebf66a99400514456f94e93af9090be97143e6915e38ed72f9568c472f452affd1fb9a79261b01a2158b9ec3ccf5ea7c8f4a9a59f47a5e176974aa51cc2e0d73e5663be1432645aa5cb10265030c06871734480367c5fdff0ead407345ead54f6114c3f790f39df6b1f2d6fc3c3e10d4a6d4e1e54aafdd1d2fbb1f312b756abfc73c6233a12f357fcc3b7cbfd76d93d0181f9a2e637ff6661df4fc9624aed89ca8356e8000000000100000074caae1dd03000"/196, &(0x7f0000000400), &(0x7f0000000380), &(0x7f0000000680)="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") (async) clone(0x400, &(0x7f0000000000)="3342655f1b72661d107e15376a0351ea2c7a38c6d293aa7bda26e336847d6d6d60076c38c1c9f59c8ce4b77282a790dd2f6409feb30af4bf3a5eef2c329cab69302119afd122b63b98c338f9327731217d5f4b288358250da0f2056f691da54a75e1d53f8b3951655ddc7f390e7b20e10932a5de59980d072199c52bc5f42b84274fcf965567656e13f0896cfc9400a92c56fea114c73c532da61c40a76163d2e65f37963ac0", &(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)="764b48ebda5b40398f2b9d3508e09c4706f467d3376f6e03fa558457a8486a8a6ec37036395931b6551e2a8a70122921ca2429160828d495") (async) 17:15:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00'}, 0x10) socket(0x10, 0x803, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:15:58 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:15:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002cc0)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:15:58 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x67, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10084}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) r2 = dup3(r0, r1, 0x80000) open(&(0x7f0000000540)='./file0\x00', 0x880, 0x21) (async) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, &(0x7f0000000200)) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) pwrite64(r2, &(0x7f0000000500)="ea65601af6", 0x5, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) clone(0xd0100100, &(0x7f0000000580)="97a493e5a476ed5d9b4c6e0fa6fa4cfdf8", &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="fa641352637c37ec6ad156c9a42019bb697a026837c298370aa0780ee91fc1c4c1bdaab9196e6a") (async) clone(0x8b01b8b4dcb40211, &(0x7f0000000240)="8abde9b8cfaebf66a99400514456f94e93af9090be97143e6915e38ed72f9568c472f452affd1fb9a79261b01a2158b9ec3ccf5ea7c8f4a9a59f47a5e176974aa51cc2e0d73e5663be1432645aa5cb10265030c06871734480367c5fdff0ead407345ead54f6114c3f790f39df6b1f2d6fc3c3e10d4a6d4e1e54aafdd1d2fbb1f312b756abfc73c6233a12f357fcc3b7cbfd76d93d0181f9a2e637ff6661df4fc9624aed89ca8356e8000000000100000074caae1dd03000"/196, &(0x7f0000000400), &(0x7f0000000380), &(0x7f0000000680)="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") (async) clone(0x400, &(0x7f0000000000)="3342655f1b72661d107e15376a0351ea2c7a38c6d293aa7bda26e336847d6d6d60076c38c1c9f59c8ce4b77282a790dd2f6409feb30af4bf3a5eef2c329cab69302119afd122b63b98c338f9327731217d5f4b288358250da0f2056f691da54a75e1d53f8b3951655ddc7f390e7b20e10932a5de59980d072199c52bc5f42b84274fcf965567656e13f0896cfc9400a92c56fea114c73c532da61c40a76163d2e65f37963ac0", &(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)="764b48ebda5b40398f2b9d3508e09c4706f467d3376f6e03fa558457a8486a8a6ec37036395931b6551e2a8a70122921ca2429160828d495") 17:15:58 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xef, 0x3b9}, 0x10000, 0x100000001, 0x0, 0x1, 0x0, 0x2, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x103, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 170.748661][T21576] loop4: detected capacity change from 0 to 262160 17:15:58 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xef, 0x3b9}, 0x10000, 0x100000001, 0x0, 0x1, 0x0, 0x2, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async, rerun: 64) fallocate(r0, 0x18, 0x103, 0x6) (async, rerun: 64) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:15:58 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xef, 0x3b9}, 0x10000, 0x100000001, 0x0, 0x1, 0x0, 0x2, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x103, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:15:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r0) 17:15:59 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x5}, @func={0x7, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000040)=""/38, 0x37, 0x26, 0x1}, 0x20) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x208000, 0x0) splice(r1, &(0x7f00000000c0)=0x4, r2, &(0x7f0000000300), 0xffffffffffffffff, 0x6) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x0, 0x10, 0x70bd29, 0x25dfdbfc, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0xef7a, 0x7f}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x90}, 0x200040d0) 17:15:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002cc0)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 171.323136][T21889] loop4: detected capacity change from 0 to 262160 17:15:59 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:15:59 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x5}, @func={0x7, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000040)=""/38, 0x37, 0x26, 0x1}, 0x20) (async) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x208000, 0x0) splice(r1, &(0x7f00000000c0)=0x4, r2, &(0x7f0000000300), 0xffffffffffffffff, 0x6) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) (async) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x0, 0x10, 0x70bd29, 0x25dfdbfc, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0xef7a, 0x7f}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x90}, 0x200040d0) 17:15:59 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x0, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:15:59 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:15:59 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x5}, @func={0x7, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000040)=""/38, 0x37, 0x26, 0x1}, 0x20) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x208000, 0x0) splice(r1, &(0x7f00000000c0)=0x4, r2, &(0x7f0000000300), 0xffffffffffffffff, 0x6) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x0, 0x10, 0x70bd29, 0x25dfdbfc, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0xef7a, 0x7f}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x90}, 0x200040d0) 17:15:59 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x5) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x10000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = socket$inet(0x2, 0x6, 0x5) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x2020, 0x4) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:15:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002cc0)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:15:59 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x5) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x10000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = socket$inet(0x2, 0x6, 0x5) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x2020, 0x4) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x5) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x10000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) socket$inet(0x2, 0x6, 0x5) (async) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) (async) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x2020, 0x4) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) [ 171.651263][T22312] loop4: detected capacity change from 0 to 262160 17:15:59 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x5) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x10000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) (async, rerun: 32) r1 = socket$inet(0x2, 0x6, 0x5) (rerun: 32) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) (async) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x2020, 0x4) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r0) 17:16:00 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) 17:16:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 172.171373][T22520] loop4: detected capacity change from 0 to 262160 17:16:00 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:00 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) 17:16:00 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x0, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:00 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:00 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) (async) [ 172.382343][T22737] loop4: detected capacity change from 0 to 262160 17:16:00 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x81, 0x9, 0x1, 0x1, 0x0, 0x7, 0x80008, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x80, 0x80, 0xfff, 0x7, 0x70, 0xfff, 0x400, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x2) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/26, 0x1a}], 0x1) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:00 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x81, 0x9, 0x1, 0x1, 0x0, 0x7, 0x80008, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x80, 0x80, 0xfff, 0x7, 0x70, 0xfff, 0x400, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x2) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/26, 0x1a}], 0x1) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x81, 0x9, 0x1, 0x1, 0x0, 0x7, 0x80008, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x80, 0x80, 0xfff, 0x7, 0x70, 0xfff, 0x400, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x2) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/26, 0x1a}], 0x1) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) [ 172.546503][T22845] loop4: detected capacity change from 0 to 262160 17:16:01 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x81, 0x9, 0x1, 0x1, 0x0, 0x7, 0x80008, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x80, 0x80, 0xfff, 0x7, 0x70, 0xfff, 0x400, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x2) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/26, 0x1a}], 0x1) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x81, 0x9, 0x1, 0x1, 0x0, 0x7, 0x80008, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x80, 0x80, 0xfff, 0x7, 0x70, 0xfff, 0x400, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x2) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/26, 0x1a}], 0x1) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r0) 17:16:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 173.021312][T23054] loop4: detected capacity change from 0 to 262160 17:16:01 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:01 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={r0, 0x6, 0xb0d, 0x8}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000040000180060001000a00000008000500000000000c000700000000000000000008000900000000000700060072720000080008"], 0x54}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x5c, r3, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @loopback}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4010) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x0, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:01 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:01 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={r0, 0x6, 0xb0d, 0x8}) (async) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000040000180060001000a00000008000500000000000c000700000000000000000008000900000000000700060072720000080008"], 0x54}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x5c, r3, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @loopback}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4010) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 173.224543][T23166] loop4: detected capacity change from 0 to 262160 17:16:01 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={r0, 0x6, 0xb0d, 0x8}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000040000180060001000a00000008000500000000000c000700000000000000000008000900000000000700060072720000080008"], 0x54}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x5c, r3, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @loopback}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4010) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={r0, 0x6, 0xb0d, 0x8}) (async) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000040000180060001000a00000008000500000000000c000700000000000000000008000900000000000700060072720000080008"], 0x54}}, 0x0) (async) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x5c, r3, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @loopback}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4010) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:01 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1000, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_loose}, {@debug={'debug', 0x3d, 0x200}}, {@debug={'debug', 0x3d, 0x8}}, {@mmap}, {@privport}], [{@smackfsdef={'smackfsdef', 0x3d, '\'.%!@'}}, {@fsname={'fsname', 0x3d, '/dev/hwrng\x00'}}, {@subj_user={'subj_user', 0x3d, '/dev/hwrng\x00'}}, {@obj_user={'obj_user', 0x3d, '/dev/hwrng\x00'}}, {@hash}]}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x4, 0x8}}, './file0\x00'}) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:01 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1000, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_loose}, {@debug={'debug', 0x3d, 0x200}}, {@debug={'debug', 0x3d, 0x8}}, {@mmap}, {@privport}], [{@smackfsdef={'smackfsdef', 0x3d, '\'.%!@'}}, {@fsname={'fsname', 0x3d, '/dev/hwrng\x00'}}, {@subj_user={'subj_user', 0x3d, '/dev/hwrng\x00'}}, {@obj_user={'obj_user', 0x3d, '/dev/hwrng\x00'}}, {@hash}]}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x4, 0x8}}, './file0\x00'}) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 173.553773][T23682] loop4: detected capacity change from 0 to 262160 17:16:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:01 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1000, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_loose}, {@debug={'debug', 0x3d, 0x200}}, {@debug={'debug', 0x3d, 0x8}}, {@mmap}, {@privport}], [{@smackfsdef={'smackfsdef', 0x3d, '\'.%!@'}}, {@fsname={'fsname', 0x3d, '/dev/hwrng\x00'}}, {@subj_user={'subj_user', 0x3d, '/dev/hwrng\x00'}}, {@obj_user={'obj_user', 0x3d, '/dev/hwrng\x00'}}, {@hash}]}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x4, 0x8}}, './file0\x00'}) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:02 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:02 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:02 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:02 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r2 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(0x0, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_open_procfs(r2, &(0x7f00000005c0)='net/ip6_tables_matches\x00') io_setup(0x1, &(0x7f0000000000)=0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010031000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r5, &(0x7f0000000140), 0xfffffffffffffe5e) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) r7 = pidfd_getfd(r1, r0, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r8, &(0x7f0000000140), 0xffffffe2) io_submit(r3, 0x4, &(0x7f0000000580)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000000040)="bf3c120f6d47d37eb3e76adaf666365e364f6af01c6304531aebcdc8001fd038e8d25bcceb6529ecd5c0c2654ae4e6eb429eeefa94070042a4c4a4c99d079d403ead38ecaefc5cb973d8e5a8ed27c027832cc4ee9d16b9ece519f82e2311340f947e67", 0x63, 0x100000001, 0x0, 0x3, r4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x524, r0, &(0x7f00000001c0)="96194929fc48fe1749f8ac648d2f820799bd21559b245a26ecc69da00c6f9be05012ebbeedf6ce5445a9a4bb6558f1fb5b2dc17f08f686c7e18fe608bbf1af3f5e7310196f4e26094f3c234fc88936060f6d7f4c856d443575d1d25df152937b91b0f978a5af353294f8b10e208520e13e3b0f1c932c9a87251d3ae4f8c67a07ff4cf92b30d9e6af3d638bcdaed38d77531fff4c792cc365117140705cd52b61597a6279980128ab87c6e9afbc7c147132823a43b252ecbfbffe4c6299066d378fa1ec23439ac10c13117ebbd15acd5a4f", 0xd1, 0x10000, 0x0, 0x2, r5}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x6, 0x18, r6, &(0x7f0000000380)="0ffc9b0f7cfbfdc2fc8fedf1593ac9e43835039f6e01ab2c1aa8af8a2a8dd68a6952ce8945d2e62a056f707d55532884011c12b6dbb444ac8658563237445e537d9f7edaa2cc8fc863daa863aeeafeb4ed69614c9d928966ea1d2a9c4c1acb1a43cc59562e33eac01dcde99284eb76a08192c815f2fb4ee0111aedddb998fd11522795f7b2a931d86b362524d0da9228d67cd6c2817d0caa012bd7b04ee8c6819c94be", 0xa3, 0x2, 0x0, 0x2, r7}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xa, 0x4, r8, &(0x7f0000000440)="3b9497f4cc16f5dc9930e54026e28efdf5044f2dca1406b3657d3794c81f1cde08d36e73fe8020a6bb2617330f696c9437cc8fec2614b6e5dc73e7111d11eac013ffbada9aaed6b747605d94e89dc560dc174e319edf7051902a89d9138209a79abf4847d304a74fbee264ab3546150ef34e600df3d5b059e9d59ad40c4f7f66482d44b63cc18cc09d2e5af396357ffc8c763d432fb8bdc8059ebb84c754318aa843b5449189547d5a93fd30a4fca146e69ce6645c32325546c2d202698bb17d83934a189f51a7b54c990d33deb01ca01f9755a0a6f56d074b644be4820e03cd593d", 0xe2, 0x9, 0x0, 0x1, r0}]) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 174.024048][T23792] loop4: detected capacity change from 0 to 262160 17:16:02 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r2 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(0x0, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_open_procfs(r2, &(0x7f00000005c0)='net/ip6_tables_matches\x00') io_setup(0x1, &(0x7f0000000000)=0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010031000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r5, &(0x7f0000000140), 0xfffffffffffffe5e) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) r7 = pidfd_getfd(r1, r0, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r8, &(0x7f0000000140), 0xffffffe2) io_submit(r3, 0x4, &(0x7f0000000580)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000000040)="bf3c120f6d47d37eb3e76adaf666365e364f6af01c6304531aebcdc8001fd038e8d25bcceb6529ecd5c0c2654ae4e6eb429eeefa94070042a4c4a4c99d079d403ead38ecaefc5cb973d8e5a8ed27c027832cc4ee9d16b9ece519f82e2311340f947e67", 0x63, 0x100000001, 0x0, 0x3, r4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x524, r0, &(0x7f00000001c0)="96194929fc48fe1749f8ac648d2f820799bd21559b245a26ecc69da00c6f9be05012ebbeedf6ce5445a9a4bb6558f1fb5b2dc17f08f686c7e18fe608bbf1af3f5e7310196f4e26094f3c234fc88936060f6d7f4c856d443575d1d25df152937b91b0f978a5af353294f8b10e208520e13e3b0f1c932c9a87251d3ae4f8c67a07ff4cf92b30d9e6af3d638bcdaed38d77531fff4c792cc365117140705cd52b61597a6279980128ab87c6e9afbc7c147132823a43b252ecbfbffe4c6299066d378fa1ec23439ac10c13117ebbd15acd5a4f", 0xd1, 0x10000, 0x0, 0x2, r5}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x6, 0x18, r6, &(0x7f0000000380)="0ffc9b0f7cfbfdc2fc8fedf1593ac9e43835039f6e01ab2c1aa8af8a2a8dd68a6952ce8945d2e62a056f707d55532884011c12b6dbb444ac8658563237445e537d9f7edaa2cc8fc863daa863aeeafeb4ed69614c9d928966ea1d2a9c4c1acb1a43cc59562e33eac01dcde99284eb76a08192c815f2fb4ee0111aedddb998fd11522795f7b2a931d86b362524d0da9228d67cd6c2817d0caa012bd7b04ee8c6819c94be", 0xa3, 0x2, 0x0, 0x2, r7}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xa, 0x4, r8, &(0x7f0000000440)="3b9497f4cc16f5dc9930e54026e28efdf5044f2dca1406b3657d3794c81f1cde08d36e73fe8020a6bb2617330f696c9437cc8fec2614b6e5dc73e7111d11eac013ffbada9aaed6b747605d94e89dc560dc174e319edf7051902a89d9138209a79abf4847d304a74fbee264ab3546150ef34e600df3d5b059e9d59ad40c4f7f66482d44b63cc18cc09d2e5af396357ffc8c763d432fb8bdc8059ebb84c754318aa843b5449189547d5a93fd30a4fca146e69ce6645c32325546c2d202698bb17d83934a189f51a7b54c990d33deb01ca01f9755a0a6f56d074b644be4820e03cd593d", 0xe2, 0x9, 0x0, 0x1, r0}]) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) (async) fcntl$getown(0xffffffffffffffff, 0x9) (async) perf_event_open(0x0, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) syz_open_procfs(r2, &(0x7f00000005c0)='net/ip6_tables_matches\x00') (async) io_setup(0x1, &(0x7f0000000000)) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010031000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r5, &(0x7f0000000140), 0xfffffffffffffe5e) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) (async) pidfd_getfd(r1, r0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r8, &(0x7f0000000140), 0xffffffe2) (async) io_submit(r3, 0x4, &(0x7f0000000580)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000000040)="bf3c120f6d47d37eb3e76adaf666365e364f6af01c6304531aebcdc8001fd038e8d25bcceb6529ecd5c0c2654ae4e6eb429eeefa94070042a4c4a4c99d079d403ead38ecaefc5cb973d8e5a8ed27c027832cc4ee9d16b9ece519f82e2311340f947e67", 0x63, 0x100000001, 0x0, 0x3, r4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x524, r0, &(0x7f00000001c0)="96194929fc48fe1749f8ac648d2f820799bd21559b245a26ecc69da00c6f9be05012ebbeedf6ce5445a9a4bb6558f1fb5b2dc17f08f686c7e18fe608bbf1af3f5e7310196f4e26094f3c234fc88936060f6d7f4c856d443575d1d25df152937b91b0f978a5af353294f8b10e208520e13e3b0f1c932c9a87251d3ae4f8c67a07ff4cf92b30d9e6af3d638bcdaed38d77531fff4c792cc365117140705cd52b61597a6279980128ab87c6e9afbc7c147132823a43b252ecbfbffe4c6299066d378fa1ec23439ac10c13117ebbd15acd5a4f", 0xd1, 0x10000, 0x0, 0x2, r5}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x6, 0x18, r6, &(0x7f0000000380)="0ffc9b0f7cfbfdc2fc8fedf1593ac9e43835039f6e01ab2c1aa8af8a2a8dd68a6952ce8945d2e62a056f707d55532884011c12b6dbb444ac8658563237445e537d9f7edaa2cc8fc863daa863aeeafeb4ed69614c9d928966ea1d2a9c4c1acb1a43cc59562e33eac01dcde99284eb76a08192c815f2fb4ee0111aedddb998fd11522795f7b2a931d86b362524d0da9228d67cd6c2817d0caa012bd7b04ee8c6819c94be", 0xa3, 0x2, 0x0, 0x2, r7}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xa, 0x4, r8, &(0x7f0000000440)="3b9497f4cc16f5dc9930e54026e28efdf5044f2dca1406b3657d3794c81f1cde08d36e73fe8020a6bb2617330f696c9437cc8fec2614b6e5dc73e7111d11eac013ffbada9aaed6b747605d94e89dc560dc174e319edf7051902a89d9138209a79abf4847d304a74fbee264ab3546150ef34e600df3d5b059e9d59ad40c4f7f66482d44b63cc18cc09d2e5af396357ffc8c763d432fb8bdc8059ebb84c754318aa843b5449189547d5a93fd30a4fca146e69ce6645c32325546c2d202698bb17d83934a189f51a7b54c990d33deb01ca01f9755a0a6f56d074b644be4820e03cd593d", 0xe2, 0x9, 0x0, 0x1, r0}]) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:02 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) (async) r2 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(0x0, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_open_procfs(r2, &(0x7f00000005c0)='net/ip6_tables_matches\x00') io_setup(0x1, &(0x7f0000000000)=0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010031000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r5, &(0x7f0000000140), 0xfffffffffffffe5e) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) r7 = pidfd_getfd(r1, r0, 0x0) (async) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r8, &(0x7f0000000140), 0xffffffe2) (async) io_submit(r3, 0x4, &(0x7f0000000580)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000000040)="bf3c120f6d47d37eb3e76adaf666365e364f6af01c6304531aebcdc8001fd038e8d25bcceb6529ecd5c0c2654ae4e6eb429eeefa94070042a4c4a4c99d079d403ead38ecaefc5cb973d8e5a8ed27c027832cc4ee9d16b9ece519f82e2311340f947e67", 0x63, 0x100000001, 0x0, 0x3, r4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x524, r0, &(0x7f00000001c0)="96194929fc48fe1749f8ac648d2f820799bd21559b245a26ecc69da00c6f9be05012ebbeedf6ce5445a9a4bb6558f1fb5b2dc17f08f686c7e18fe608bbf1af3f5e7310196f4e26094f3c234fc88936060f6d7f4c856d443575d1d25df152937b91b0f978a5af353294f8b10e208520e13e3b0f1c932c9a87251d3ae4f8c67a07ff4cf92b30d9e6af3d638bcdaed38d77531fff4c792cc365117140705cd52b61597a6279980128ab87c6e9afbc7c147132823a43b252ecbfbffe4c6299066d378fa1ec23439ac10c13117ebbd15acd5a4f", 0xd1, 0x10000, 0x0, 0x2, r5}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x6, 0x18, r6, &(0x7f0000000380)="0ffc9b0f7cfbfdc2fc8fedf1593ac9e43835039f6e01ab2c1aa8af8a2a8dd68a6952ce8945d2e62a056f707d55532884011c12b6dbb444ac8658563237445e537d9f7edaa2cc8fc863daa863aeeafeb4ed69614c9d928966ea1d2a9c4c1acb1a43cc59562e33eac01dcde99284eb76a08192c815f2fb4ee0111aedddb998fd11522795f7b2a931d86b362524d0da9228d67cd6c2817d0caa012bd7b04ee8c6819c94be", 0xa3, 0x2, 0x0, 0x2, r7}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xa, 0x4, r8, &(0x7f0000000440)="3b9497f4cc16f5dc9930e54026e28efdf5044f2dca1406b3657d3794c81f1cde08d36e73fe8020a6bb2617330f696c9437cc8fec2614b6e5dc73e7111d11eac013ffbada9aaed6b747605d94e89dc560dc174e319edf7051902a89d9138209a79abf4847d304a74fbee264ab3546150ef34e600df3d5b059e9d59ad40c4f7f66482d44b63cc18cc09d2e5af396357ffc8c763d432fb8bdc8059ebb84c754318aa843b5449189547d5a93fd30a4fca146e69ce6645c32325546c2d202698bb17d83934a189f51a7b54c990d33deb01ca01f9755a0a6f56d074b644be4820e03cd593d", 0xe2, 0x9, 0x0, 0x1, r0}]) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:02 executing program 4: chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:02 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r1, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x4000884) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x11, 0x4, 0x70bd2b, 0x25dfdbfc, {0x12}, [@typed={0x8, 0x1a, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x41}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x4000040) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x10000, 0x9, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) fallocate(r3, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:02 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r1, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x4000884) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x11, 0x4, 0x70bd2b, 0x25dfdbfc, {0x12}, [@typed={0x8, 0x1a, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x41}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x4000040) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x10000, 0x9, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) fallocate(r3, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:02 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r1, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x4000884) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x11, 0x4, 0x70bd2b, 0x25dfdbfc, {0x12}, [@typed={0x8, 0x1a, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x41}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x4000040) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x10000, 0x9, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) fallocate(r3, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r1, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x4000884) (async) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$nl_generic(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x11, 0x4, 0x70bd2b, 0x25dfdbfc, {0x12}, [@typed={0x8, 0x1a, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x41}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x4000040) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x10000, 0x9, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r3, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:02 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:02 executing program 4: chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:02 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:02 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:02 executing program 2: bind$l2tp6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x2, @mcast2, 0x1}, 0x20) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0xa84c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x808000, 0x3b9}, 0x12400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x244201, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) fallocate(r2, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) connect$l2tp6(r3, &(0x7f00000005c0)={0xa, 0x0, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x4}, 0x20) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/78, 0x4e}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f00000000c0)=""/23, 0x17}, {&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/23, 0x17}, {&(0x7f0000000200)=""/179, 0xb3}, {&(0x7f00000002c0)=""/91, 0x5b}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/141, 0x8d}], 0x9, 0x1f, 0x36d) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000580)='ip6gretap0\x00', 0x10) 17:16:03 executing program 2: bind$l2tp6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x2, @mcast2, 0x1}, 0x20) (async) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0xa84c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x808000, 0x3b9}, 0x12400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x244201, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) fallocate(r2, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) (async, rerun: 64) connect$l2tp6(r3, &(0x7f00000005c0)={0xa, 0x0, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x4}, 0x20) (rerun: 64) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/78, 0x4e}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f00000000c0)=""/23, 0x17}, {&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/23, 0x17}, {&(0x7f0000000200)=""/179, 0xb3}, {&(0x7f00000002c0)=""/91, 0x5b}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/141, 0x8d}], 0x9, 0x1f, 0x36d) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000580)='ip6gretap0\x00', 0x10) 17:16:03 executing program 2: bind$l2tp6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x2, @mcast2, 0x1}, 0x20) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0xa84c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x808000, 0x3b9}, 0x12400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x244201, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) fallocate(r2, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) connect$l2tp6(r3, &(0x7f00000005c0)={0xa, 0x0, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x4}, 0x20) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/78, 0x4e}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f00000000c0)=""/23, 0x17}, {&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/23, 0x17}, {&(0x7f0000000200)=""/179, 0xb3}, {&(0x7f00000002c0)=""/91, 0x5b}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/141, 0x8d}], 0x9, 0x1f, 0x36d) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000580)='ip6gretap0\x00', 0x10) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x2, @mcast2, 0x1}, 0x20) (async) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0xa84c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x808000, 0x3b9}, 0x12400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x244201, 0x0) (async) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) (async) fallocate(r2, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) (async) connect$l2tp6(r3, &(0x7f00000005c0)={0xa, 0x0, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x4}, 0x20) (async) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/78, 0x4e}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f00000000c0)=""/23, 0x17}, {&(0x7f0000000180)=""/59, 0x3b}, {&(0x7f00000001c0)=""/23, 0x17}, {&(0x7f0000000200)=""/179, 0xb3}, {&(0x7f00000002c0)=""/91, 0x5b}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/141, 0x8d}], 0x9, 0x1f, 0x36d) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) (async) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000580)='ip6gretap0\x00', 0x10) (async) 17:16:03 executing program 4: chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:03 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) gettid() 17:16:03 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) gettid() ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) gettid() (async) 17:16:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:03 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) gettid() ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) gettid() (async) 17:16:03 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:03 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:03 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 175.715036][T25057] loop4: detected capacity change from 0 to 262160 17:16:03 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:03 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0x10100000, &(0x7f0000000000)="c9a5d96e7861d46e1fcd76fa1eb155257fea09dc78a521c6417a74e93645bcc1d191725729", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)="89e38609f6f8ea40f63590025f8233777814cef071ab5db209ebd036656b33f48b6200aa612640eabc71632310361b8a10e0626de423a140ec12b3c8f5952c67c0046bea63f888001790940cfc40f7ab556fbcccfbad6b515120a85a5ea3823264aeddd80577b0b9453ad7b37f206eedcb19bda508cccca95df956c0160e7d5583c4e572a5e88f961a44dbeeebe49fc63a7919d0caf0fec31fe08fc3ba276dc875b7e5d3acb058fc565b6487808198840823c9") 17:16:03 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) clone(0x10100000, &(0x7f0000000000)="c9a5d96e7861d46e1fcd76fa1eb155257fea09dc78a521c6417a74e93645bcc1d191725729", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)="89e38609f6f8ea40f63590025f8233777814cef071ab5db209ebd036656b33f48b6200aa612640eabc71632310361b8a10e0626de423a140ec12b3c8f5952c67c0046bea63f888001790940cfc40f7ab556fbcccfbad6b515120a85a5ea3823264aeddd80577b0b9453ad7b37f206eedcb19bda508cccca95df956c0160e7d5583c4e572a5e88f961a44dbeeebe49fc63a7919d0caf0fec31fe08fc3ba276dc875b7e5d3acb058fc565b6487808198840823c9") 17:16:03 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) clone(0x10100000, &(0x7f0000000000)="c9a5d96e7861d46e1fcd76fa1eb155257fea09dc78a521c6417a74e93645bcc1d191725729", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)="89e38609f6f8ea40f63590025f8233777814cef071ab5db209ebd036656b33f48b6200aa612640eabc71632310361b8a10e0626de423a140ec12b3c8f5952c67c0046bea63f888001790940cfc40f7ab556fbcccfbad6b515120a85a5ea3823264aeddd80577b0b9453ad7b37f206eedcb19bda508cccca95df956c0160e7d5583c4e572a5e88f961a44dbeeebe49fc63a7919d0caf0fec31fe08fc3ba276dc875b7e5d3acb058fc565b6487808198840823c9") 17:16:03 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:04 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:04 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 176.135359][T25579] loop4: detected capacity change from 0 to 262160 17:16:04 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00'}, 0x10) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r0) 17:16:04 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:04 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 176.485018][T25688] loop4: detected capacity change from 0 to 262160 17:16:04 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:04 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:04 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x57}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fff}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x200400d0}, 0x40000) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x1, 0x20, 0x9a, 0x0, 0x6d9b, 0x6000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd67, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x800, 0x7f51, 0x8001, 0x1, 0x10001, 0x400, 0x400, 0x0, 0x4, 0x0, 0x1ff}, 0x0, 0xb, 0xffffffffffffffff, 0x8) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:04 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x57}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fff}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x200400d0}, 0x40000) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x1, 0x20, 0x9a, 0x0, 0x6d9b, 0x6000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd67, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x800, 0x7f51, 0x8001, 0x1, 0x10001, 0x400, 0x400, 0x0, 0x4, 0x0, 0x1ff}, 0x0, 0xb, 0xffffffffffffffff, 0x8) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x57}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fff}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x200400d0}, 0x40000) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x1, 0x20, 0x9a, 0x0, 0x6d9b, 0x6000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd67, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x800, 0x7f51, 0x8001, 0x1, 0x10001, 0x400, 0x400, 0x0, 0x4, 0x0, 0x1ff}, 0x0, 0xb, 0xffffffffffffffff, 0x8) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:04 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x57}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fff}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x200400d0}, 0x40000) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x1, 0x20, 0x9a, 0x0, 0x6d9b, 0x6000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd67, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x800, 0x7f51, 0x8001, 0x1, 0x10001, 0x400, 0x400, 0x0, 0x4, 0x0, 0x1ff}, 0x0, 0xb, 0xffffffffffffffff, 0x8) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 176.795550][T25842] loop4: detected capacity change from 0 to 262160 17:16:04 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0x8000000, &(0x7f0000000000)="3fde17b9b0f736c8ebbe1e", &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="7efd0fa3a0dc6fb9dc2d7fdbea9d7587a6c44e81e9535ed5d921b25fcf74ab0023dc8858124ccc4bf1e7") 17:16:04 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0x8000000, &(0x7f0000000000)="3fde17b9b0f736c8ebbe1e", &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="7efd0fa3a0dc6fb9dc2d7fdbea9d7587a6c44e81e9535ed5d921b25fcf74ab0023dc8858124ccc4bf1e7") 17:16:05 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0x8000000, &(0x7f0000000000)="3fde17b9b0f736c8ebbe1e", &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="7efd0fa3a0dc6fb9dc2d7fdbea9d7587a6c44e81e9535ed5d921b25fcf74ab0023dc8858124ccc4bf1e7") 17:16:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00'}, 0x10) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r0) 17:16:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 177.260280][T26222] loop4: detected capacity change from 0 to 262160 17:16:05 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:05 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:05 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) [ 177.550847][T26435] loop4: detected capacity change from 0 to 262160 17:16:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:05 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r2, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x9a, 0x4, 0x1, 0xdc, 0x0, 0x3, 0x1, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x4, 0x107}, 0xa, 0x200, 0x5, 0x7, 0x1, 0x4, 0x3ff, 0x0, 0x494f}, r3, 0x7, r4, 0x3) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:05 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r2, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x9a, 0x4, 0x1, 0xdc, 0x0, 0x3, 0x1, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x4, 0x107}, 0xa, 0x200, 0x5, 0x7, 0x1, 0x4, 0x3ff, 0x0, 0x494f}, r3, 0x7, r4, 0x3) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) socket$inet(0x2, 0x6000000000000003, 0x4) (async) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) (async) sendto$inet(r2, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) (async) fcntl$getown(r2, 0x9) (async) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x9a, 0x4, 0x1, 0xdc, 0x0, 0x3, 0x1, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x4, 0x107}, 0xa, 0x200, 0x5, 0x7, 0x1, 0x4, 0x3ff, 0x0, 0x494f}, r3, 0x7, r4, 0x3) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00'}, 0x10) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r0) 17:16:06 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r2 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r2, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) (async) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x9a, 0x4, 0x1, 0xdc, 0x0, 0x3, 0x1, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x4, 0x107}, 0xa, 0x200, 0x5, 0x7, 0x1, 0x4, 0x3ff, 0x0, 0x494f}, r3, 0x7, r4, 0x3) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:06 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:06 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:06 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) syz_usbip_server_init(0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x401}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x412840, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000f80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000140)={0x0, 0x80000001, @start={r2, 0x0, "5ec571d7576d7d80f3f92a7346e251565b67161f20d1b092b5f553d423656a05a746935793435bc902c08d09d40fdf9c477a040e48f4a3a883c6e5b005948b798295b746b9c525949a6d2ec8c864f3e86e16e2defa3540099b9bd0355a69974b059500387bf29c540e4b7e6ae7cc94fbb9a7041249045da6cafbe4eead646946c4f75dbd2ffa606ce4a8b4eea55ffc8f2ecc29168006aa02537abfaf0eb356af99a31d835acc77cbd06f3b263a0930affe54f37accc4487f751e5b95ca0debdfce3d5f9dd32109fb44fd0eb21d248c274e6eb8e5c9ef4ed6963d2283cd08de768cc352fe1abbfc5a60b85aa25876b8c62b6ffd4c203844266009ad678b9f9f2e886a0cacee571b596e037da739fa55ecad89ac9711d813c5b8f253d8364c6dd81c93d93b5bcb7f2f80888353b92db36398834dc093d24e181ac5fd2f1b7ea17e3fbdb7baee3838476e64fd882596bc8f23d2f3f956bf0c3a1a0d352bf018287983fc90bee951b1343983a1e0da07d5bb8046e19e36d9d96051f79ecb992697e5212f2b94f28f424090b21f75cc2f08a8d49d669b0ad2362bd5172f425c16e1dbc2fa3f3db8fcb638d2ff4ce464d67c2ad4e9b684f21a3be91144a2af1b606e1efbc6c454be68760d06c8565f7a7727cc9520901aef98e1b4cdc8f8d16b7cbe5260b13c38e7174b490238d230feb6b25d61ac435caeae3ba69cedf13d8df5f75f3dc360da6de5e36bf0762cfd8ed0d8fbc123ba0e45be906aebbe055cc2c8dc5d94a7681c81db273cd70e25b9afc5c0ea9f273f54d4289f7d3142270384bd773fd807fa303db79e52039c8f8e6d0aee2381db4dd0c1e5fc4ac1f832a65d5ae81b5595aa4b66d440ff3344817c0e416e83e09a1bb08f99e3662a8c58c445440d7d02139d74e191a3dc20df0172da79c3df5f253d74889637c5077663240957a88b3d8ce420603066d09804dff7a750ff4ff1a5d93a73f90551d3a335a64dfb2182bfd42232778f6e49348fae897cb05c27c600d80d591b0f4108ebb604c4e3beebc4f3ddbf145004c55c82b69d31680bed1e89c7bc3e921a9fc4c1e7e1e455664c017e2f9d2925790b16d8142b46bda5f5b4313d2d9eb56458894c0cf60b7aafa63921c08e304ebad567f97122814ff02acc4c8d310cd0b1be79fa92f3c28e3c4daef2265a10d08200358ce47f793c84a3aed5541a6982ddfe5bb1041b2d0c38778d8d883b28dc3e6a4e3e9f6ba1b24796a5012dbb237999f9f2861cb8c87b1a8b17bad6777c0fc964eeade011f2f9a7a60050d3314730a9bda11d0f1cf07cf8029d17e02cacc1dea52a05fe88bac6e7cc5e31853ae06d6a80dece30cf0fcfc9824c8263c28b242d3fd575830fae22b7a1c8a172580b51efc040d35a48af14957d56f195cb9d9b5b9ff328608233cd8c92882a8fe8914b7bdadc8bc413b41243cee7", "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"}, [0xfffffffffffffffd, 0x9, 0x3, 0x0, 0x7, 0x2, 0x4, 0x100000000, 0x6a, 0x6, 0x447de998, 0x1d75, 0x0, 0x0, 0x20, 0x4, 0x5, 0x7f, 0x80000000, 0x5, 0x9, 0x3ff, 0x9, 0x5986, 0xfffffffffffffff9, 0x8, 0x8, 0x20, 0x9, 0x7f, 0x61, 0x2, 0x2, 0x5, 0xc20, 0x49, 0x3, 0x52e, 0x1, 0x200, 0x1, 0x101, 0xec, 0x2, 0x2, 0x5, 0x81, 0x4, 0x5, 0x80000001, 0x8, 0x3, 0xff, 0x3, 0x100000000, 0x2, 0x6, 0x9, 0x3, 0x3, 0x75e6, 0x6, 0xfb]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000180)={r2, 0x2, 0x2}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0xc, 0x1, {0x10000, @usage=0x7, 0x0, 0x9, 0x8, 0x10000, 0x0, 0x7fffffff, 0x247, @struct={0x8001, 0x422}, 0x4, 0xff, [0x8000, 0x5, 0x3, 0x200000c26f, 0x8, 0x7ff]}, {0x1, @usage=0x4, 0x0, 0xfb2, 0x0, 0x1, 0xff2, 0xff, 0x48, @struct={0x14, 0x400}, 0x64c9, 0x1, [0x2, 0xd6ea, 0x200, 0x0, 0x0, 0x6]}, {0x2, @usage=0x80, r2, 0x8b, 0x6, 0x8, 0x3, 0x80, 0x0, @struct={0x7ff, 0x3}, 0x3, 0x100000, [0x6, 0x4, 0x7, 0xe7, 0x2, 0x81]}, {0x0, 0x200, 0xb8}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000380)={0x5, 0x4, {0x6, @struct={0x5}, 0x0, 0x7, 0x1, 0x7ba1, 0x1ff, 0x5, 0x40, @usage=0x7, 0x1000, 0xa335, [0x3, 0x5, 0x9, 0x4, 0x2, 0x4]}, {0xfffffffffffffffe, @usage=0x1, 0x0, 0x7f, 0x4, 0x24000000, 0x37, 0x4, 0x0, @struct={0x2, 0xd6b}, 0x3f, 0xfffffa24, [0x20, 0x0, 0x8, 0x74c, 0xffffffffffffe150, 0x4]}, {0x7fff, @usage=0x5, r2, 0x5, 0xfffffffffffffffd, 0x8a, 0x100000001, 0x6, 0x1, @usage=0x8, 0x8, 0x89, [0x485f, 0xff, 0x7, 0x2, 0xffffffff, 0x1c]}, {0x28, 0x0, 0x1}}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) fallocate(r4, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 178.364580][T26961] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 178.379531][T26961] device lo entered promiscuous mode 17:16:06 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) syz_usbip_server_init(0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x401}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x412840, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000f80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000140)={0x0, 0x80000001, @start={r2, 0x0, "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", "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"}, [0xfffffffffffffffd, 0x9, 0x3, 0x0, 0x7, 0x2, 0x4, 0x100000000, 0x6a, 0x6, 0x447de998, 0x1d75, 0x0, 0x0, 0x20, 0x4, 0x5, 0x7f, 0x80000000, 0x5, 0x9, 0x3ff, 0x9, 0x5986, 0xfffffffffffffff9, 0x8, 0x8, 0x20, 0x9, 0x7f, 0x61, 0x2, 0x2, 0x5, 0xc20, 0x49, 0x3, 0x52e, 0x1, 0x200, 0x1, 0x101, 0xec, 0x2, 0x2, 0x5, 0x81, 0x4, 0x5, 0x80000001, 0x8, 0x3, 0xff, 0x3, 0x100000000, 0x2, 0x6, 0x9, 0x3, 0x3, 0x75e6, 0x6, 0xfb]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000180)={r2, 0x2, 0x2}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0xc, 0x1, {0x10000, @usage=0x7, 0x0, 0x9, 0x8, 0x10000, 0x0, 0x7fffffff, 0x247, @struct={0x8001, 0x422}, 0x4, 0xff, [0x8000, 0x5, 0x3, 0x200000c26f, 0x8, 0x7ff]}, {0x1, @usage=0x4, 0x0, 0xfb2, 0x0, 0x1, 0xff2, 0xff, 0x48, @struct={0x14, 0x400}, 0x64c9, 0x1, [0x2, 0xd6ea, 0x200, 0x0, 0x0, 0x6]}, {0x2, @usage=0x80, r2, 0x8b, 0x6, 0x8, 0x3, 0x80, 0x0, @struct={0x7ff, 0x3}, 0x3, 0x100000, [0x6, 0x4, 0x7, 0xe7, 0x2, 0x81]}, {0x0, 0x200, 0xb8}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000380)={0x5, 0x4, {0x6, @struct={0x5}, 0x0, 0x7, 0x1, 0x7ba1, 0x1ff, 0x5, 0x40, @usage=0x7, 0x1000, 0xa335, [0x3, 0x5, 0x9, 0x4, 0x2, 0x4]}, {0xfffffffffffffffe, @usage=0x1, 0x0, 0x7f, 0x4, 0x24000000, 0x37, 0x4, 0x0, @struct={0x2, 0xd6b}, 0x3f, 0xfffffa24, [0x20, 0x0, 0x8, 0x74c, 0xffffffffffffe150, 0x4]}, {0x7fff, @usage=0x5, r2, 0x5, 0xfffffffffffffffd, 0x8a, 0x100000001, 0x6, 0x1, @usage=0x8, 0x8, 0x89, [0x485f, 0xff, 0x7, 0x2, 0xffffffff, 0x1c]}, {0x28, 0x0, 0x1}}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) fallocate(r4, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) syz_usbip_server_init(0x0) (async) socket(0x20000000000000a, 0x2, 0x0) (async) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x401}, 0x1c) (async) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x412840, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000f80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') (async) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) (async) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000140)={0x0, 0x80000001, @start={r2, 0x0, "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", "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"}, [0xfffffffffffffffd, 0x9, 0x3, 0x0, 0x7, 0x2, 0x4, 0x100000000, 0x6a, 0x6, 0x447de998, 0x1d75, 0x0, 0x0, 0x20, 0x4, 0x5, 0x7f, 0x80000000, 0x5, 0x9, 0x3ff, 0x9, 0x5986, 0xfffffffffffffff9, 0x8, 0x8, 0x20, 0x9, 0x7f, 0x61, 0x2, 0x2, 0x5, 0xc20, 0x49, 0x3, 0x52e, 0x1, 0x200, 0x1, 0x101, 0xec, 0x2, 0x2, 0x5, 0x81, 0x4, 0x5, 0x80000001, 0x8, 0x3, 0xff, 0x3, 0x100000000, 0x2, 0x6, 0x9, 0x3, 0x3, 0x75e6, 0x6, 0xfb]}) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000180)={r2, 0x2, 0x2}) (async) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0xc, 0x1, {0x10000, @usage=0x7, 0x0, 0x9, 0x8, 0x10000, 0x0, 0x7fffffff, 0x247, @struct={0x8001, 0x422}, 0x4, 0xff, [0x8000, 0x5, 0x3, 0x200000c26f, 0x8, 0x7ff]}, {0x1, @usage=0x4, 0x0, 0xfb2, 0x0, 0x1, 0xff2, 0xff, 0x48, @struct={0x14, 0x400}, 0x64c9, 0x1, [0x2, 0xd6ea, 0x200, 0x0, 0x0, 0x6]}, {0x2, @usage=0x80, r2, 0x8b, 0x6, 0x8, 0x3, 0x80, 0x0, @struct={0x7ff, 0x3}, 0x3, 0x100000, [0x6, 0x4, 0x7, 0xe7, 0x2, 0x81]}, {0x0, 0x200, 0xb8}}) (async) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000380)={0x5, 0x4, {0x6, @struct={0x5}, 0x0, 0x7, 0x1, 0x7ba1, 0x1ff, 0x5, 0x40, @usage=0x7, 0x1000, 0xa335, [0x3, 0x5, 0x9, 0x4, 0x2, 0x4]}, {0xfffffffffffffffe, @usage=0x1, 0x0, 0x7f, 0x4, 0x24000000, 0x37, 0x4, 0x0, @struct={0x2, 0xd6b}, 0x3f, 0xfffffa24, [0x20, 0x0, 0x8, 0x74c, 0xffffffffffffe150, 0x4]}, {0x7fff, @usage=0x5, r2, 0x5, 0xfffffffffffffffd, 0x8a, 0x100000001, 0x6, 0x1, @usage=0x8, 0x8, 0x89, [0x485f, 0xff, 0x7, 0x2, 0xffffffff, 0x1c]}, {0x28, 0x0, 0x1}}) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r4, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 178.508349][T27068] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 17:16:06 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) syz_usbip_server_init(0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x401}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x412840, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000f80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000140)={0x0, 0x80000001, @start={r2, 0x0, "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", "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"}, [0xfffffffffffffffd, 0x9, 0x3, 0x0, 0x7, 0x2, 0x4, 0x100000000, 0x6a, 0x6, 0x447de998, 0x1d75, 0x0, 0x0, 0x20, 0x4, 0x5, 0x7f, 0x80000000, 0x5, 0x9, 0x3ff, 0x9, 0x5986, 0xfffffffffffffff9, 0x8, 0x8, 0x20, 0x9, 0x7f, 0x61, 0x2, 0x2, 0x5, 0xc20, 0x49, 0x3, 0x52e, 0x1, 0x200, 0x1, 0x101, 0xec, 0x2, 0x2, 0x5, 0x81, 0x4, 0x5, 0x80000001, 0x8, 0x3, 0xff, 0x3, 0x100000000, 0x2, 0x6, 0x9, 0x3, 0x3, 0x75e6, 0x6, 0xfb]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000180)={r2, 0x2, 0x2}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0xc, 0x1, {0x10000, @usage=0x7, 0x0, 0x9, 0x8, 0x10000, 0x0, 0x7fffffff, 0x247, @struct={0x8001, 0x422}, 0x4, 0xff, [0x8000, 0x5, 0x3, 0x200000c26f, 0x8, 0x7ff]}, {0x1, @usage=0x4, 0x0, 0xfb2, 0x0, 0x1, 0xff2, 0xff, 0x48, @struct={0x14, 0x400}, 0x64c9, 0x1, [0x2, 0xd6ea, 0x200, 0x0, 0x0, 0x6]}, {0x2, @usage=0x80, r2, 0x8b, 0x6, 0x8, 0x3, 0x80, 0x0, @struct={0x7ff, 0x3}, 0x3, 0x100000, [0x6, 0x4, 0x7, 0xe7, 0x2, 0x81]}, {0x0, 0x200, 0xb8}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000380)={0x5, 0x4, {0x6, @struct={0x5}, 0x0, 0x7, 0x1, 0x7ba1, 0x1ff, 0x5, 0x40, @usage=0x7, 0x1000, 0xa335, [0x3, 0x5, 0x9, 0x4, 0x2, 0x4]}, {0xfffffffffffffffe, @usage=0x1, 0x0, 0x7f, 0x4, 0x24000000, 0x37, 0x4, 0x0, @struct={0x2, 0xd6b}, 0x3f, 0xfffffa24, [0x20, 0x0, 0x8, 0x74c, 0xffffffffffffe150, 0x4]}, {0x7fff, @usage=0x5, r2, 0x5, 0xfffffffffffffffd, 0x8a, 0x100000001, 0x6, 0x1, @usage=0x8, 0x8, 0x89, [0x485f, 0xff, 0x7, 0x2, 0xffffffff, 0x1c]}, {0x28, 0x0, 0x1}}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) fallocate(r4, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) syz_usbip_server_init(0x0) (async) socket(0x20000000000000a, 0x2, 0x0) (async) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x401}, 0x1c) (async) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x412840, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000f80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') (async) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) (async) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000140)={0x0, 0x80000001, @start={r2, 0x0, "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", "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"}, [0xfffffffffffffffd, 0x9, 0x3, 0x0, 0x7, 0x2, 0x4, 0x100000000, 0x6a, 0x6, 0x447de998, 0x1d75, 0x0, 0x0, 0x20, 0x4, 0x5, 0x7f, 0x80000000, 0x5, 0x9, 0x3ff, 0x9, 0x5986, 0xfffffffffffffff9, 0x8, 0x8, 0x20, 0x9, 0x7f, 0x61, 0x2, 0x2, 0x5, 0xc20, 0x49, 0x3, 0x52e, 0x1, 0x200, 0x1, 0x101, 0xec, 0x2, 0x2, 0x5, 0x81, 0x4, 0x5, 0x80000001, 0x8, 0x3, 0xff, 0x3, 0x100000000, 0x2, 0x6, 0x9, 0x3, 0x3, 0x75e6, 0x6, 0xfb]}) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000180)={r2, 0x2, 0x2}) (async) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0xc, 0x1, {0x10000, @usage=0x7, 0x0, 0x9, 0x8, 0x10000, 0x0, 0x7fffffff, 0x247, @struct={0x8001, 0x422}, 0x4, 0xff, [0x8000, 0x5, 0x3, 0x200000c26f, 0x8, 0x7ff]}, {0x1, @usage=0x4, 0x0, 0xfb2, 0x0, 0x1, 0xff2, 0xff, 0x48, @struct={0x14, 0x400}, 0x64c9, 0x1, [0x2, 0xd6ea, 0x200, 0x0, 0x0, 0x6]}, {0x2, @usage=0x80, r2, 0x8b, 0x6, 0x8, 0x3, 0x80, 0x0, @struct={0x7ff, 0x3}, 0x3, 0x100000, [0x6, 0x4, 0x7, 0xe7, 0x2, 0x81]}, {0x0, 0x200, 0xb8}}) (async) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000380)={0x5, 0x4, {0x6, @struct={0x5}, 0x0, 0x7, 0x1, 0x7ba1, 0x1ff, 0x5, 0x40, @usage=0x7, 0x1000, 0xa335, [0x3, 0x5, 0x9, 0x4, 0x2, 0x4]}, {0xfffffffffffffffe, @usage=0x1, 0x0, 0x7f, 0x4, 0x24000000, 0x37, 0x4, 0x0, @struct={0x2, 0xd6b}, 0x3f, 0xfffffa24, [0x20, 0x0, 0x8, 0x74c, 0xffffffffffffe150, 0x4]}, {0x7fff, @usage=0x5, r2, 0x5, 0xfffffffffffffffd, 0x8a, 0x100000001, 0x6, 0x1, @usage=0x8, 0x8, 0x89, [0x485f, 0xff, 0x7, 0x2, 0xffffffff, 0x1c]}, {0x28, 0x0, 0x1}}) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r4, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) [ 178.611784][T27173] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 17:16:06 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) r3 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r4 = fcntl$getown(r3, 0x9) perf_event_open(0x0, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x8, 0x65, 0x20, 0x5, 0x0, 0x900, 0xa8190, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f0000000040), 0x9}, 0x42059, 0xffffffff, 0x6, 0x8, 0x80000000, 0xffff, 0x7ff, 0x0, 0x80, 0x0, 0x8bdf}, r4, 0xc, r0, 0x8) read$eventfd(r2, &(0x7f0000000000), 0x8) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r5, &(0x7f0000000140), 0xffffffe2) read$eventfd(r5, &(0x7f0000000180), 0x8) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:06 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async, rerun: 32) r3 = socket$inet(0x2, 0x6000000000000003, 0x4) (rerun: 32) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) (async) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r4 = fcntl$getown(r3, 0x9) perf_event_open(0x0, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x8, 0x65, 0x20, 0x5, 0x0, 0x900, 0xa8190, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f0000000040), 0x9}, 0x42059, 0xffffffff, 0x6, 0x8, 0x80000000, 0xffff, 0x7ff, 0x0, 0x80, 0x0, 0x8bdf}, r4, 0xc, r0, 0x8) (async, rerun: 32) read$eventfd(r2, &(0x7f0000000000), 0x8) (async, rerun: 32) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r5, &(0x7f0000000140), 0xffffffe2) read$eventfd(r5, &(0x7f0000000180), 0x8) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x0, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 178.958861][T27483] FAT-fs (loop4): bogus number of reserved sectors [ 178.965430][T27483] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:07 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:07 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) r3 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r4 = fcntl$getown(r3, 0x9) perf_event_open(0x0, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x8, 0x65, 0x20, 0x5, 0x0, 0x900, 0xa8190, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f0000000040), 0x9}, 0x42059, 0xffffffff, 0x6, 0x8, 0x80000000, 0xffff, 0x7ff, 0x0, 0x80, 0x0, 0x8bdf}, r4, 0xc, r0, 0x8) read$eventfd(r2, &(0x7f0000000000), 0x8) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r5, &(0x7f0000000140), 0xffffffe2) read$eventfd(r5, &(0x7f0000000180), 0x8) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) socket$inet(0x2, 0x6000000000000003, 0x4) (async) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) (async) sendto$inet(r3, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) (async) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) (async) fcntl$getown(r3, 0x9) (async) perf_event_open(0x0, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x8, 0x65, 0x20, 0x5, 0x0, 0x900, 0xa8190, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f0000000040), 0x9}, 0x42059, 0xffffffff, 0x6, 0x8, 0x80000000, 0xffff, 0x7ff, 0x0, 0x80, 0x0, 0x8bdf}, r4, 0xc, r0, 0x8) (async) read$eventfd(r2, &(0x7f0000000000), 0x8) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r5, &(0x7f0000000140), 0xffffffe2) (async) read$eventfd(r5, &(0x7f0000000180), 0x8) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:07 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:07 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:07 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="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", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r4], 0xf8, 0x40000}}], 0x4, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="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", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r7], 0xf8, 0x40000}}], 0x4, 0x0) r8 = openat$cgroup_freezer_state(r1, &(0x7f00000009c0), 0x2, 0x0) r9 = accept4$bt_l2cap(r1, &(0x7f0000000a00)={0x1f, 0x0, @fixed}, &(0x7f0000000a40)=0xe, 0x80800) r10 = syz_open_pts(r1, 0x40001) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000180)="e176ba131f83faf02b7780c7c1a1bbd7467a14785eaa11f86016ecefcd1ae84915cc3143f716650fcf5775672bf452dcab2fe547f7836fb95ef6f032ff342c551fee375b98ee647cc281fc36e5c0e4ce7f3e4a72b80b78b48de7dfc81cdb3a94536f86e10faec7cec11d36850c25a7ea7b36ba4b21f511e63c11fa9c9d9f8cc4eccff3a040a8c03f8bf34db3bd0dcfd4", 0x90}, {&(0x7f0000000240)="4fe14af01f6639e7f5e63f3c8f44ca49878a0abd227be0debe85985e09c3e58289abbcb7b3a81ad4963154af366d3e98b513b1db7696fbb40f38346ab5bc2826c701452e93fec257124df2489e7097cb5494155d45f2dfbc6b30ce8005b692b9cbf31ab0de05456c29f3a6c38856a4ac32d410c1d3652e272e9e22d29f69fe07be5eb8e3d161fc0c7ae0369b5d78b50dbb58c6255ede387b11c9ca4fa3f6bb6c79", 0xa1}, {&(0x7f0000000080)="9db8d3eefafea7c6b24e33293dd969a4285cde2ecb703b9b45ae0c4dbe6483641c6698b554b9cda651fd74e746d7e144e3b78ba65177cbdb0bde74b896c048a5e9d831881ba6d8529adbd489aab1ba19c18f10c9be3829f3508a26ac92d89c7052518d1193cad3aae5981e9ac2db5f343e", 0x71}, {&(0x7f0000000380)="afa33499941d9d77f0f418fa84a90b207dd65aad60edc9d8c11517c7169ffc2f1dbd5f03639531a5229e9a2d83aa9d251a256f0feee170358d71d461fe9c1349ad78b0b2dc", 0x45}, {&(0x7f0000000300)="ef5082c4a8a42b2aec9206ebef", 0xd}, {&(0x7f0000000400)="57a5cb8241cc8d9b286e3f75060663501ef3589854e77852b2acb87a072554314c880bb12257c943d2587274279d22c76a4304f82112684cb7bece24abdd133264ccdd4b5906fea7f13b8131ba5b725dc6cfc6d17b9ca3333e2037cc7dbb681f6d415e738f93e76077f675a5eccb12ec45f1e8d9a5f9a47b746c6015f0d710b8b0ad265774414e99b310f8b5fecac01b812d217378b78042c9f3647f123fc18144813d1832d34dc4f753afa12924e29153ce5413c1", 0xb5}, {&(0x7f00000004c0)="618bddc9ec03a47e879fbbe7bca1e0902da27e442997a815fab726fd03279a98ccbc4924f03388d2e5cb5ed9b8", 0x2d}, {&(0x7f0000000500)="e228f54409df82c017d862f3c738840830edb53ff7a6ea9197f90da53f8882eaaf84f10faed45fa360135c7f2b5ca024cc7c1e75e2459f1964d0cecf2e509c888ae7176e372f4c1b3392b69fb0e5aedb", 0x50}], 0x8, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @rights={{0x20, 0x1, 0x1, [r8, r0, r9, r10]}}], 0xa0}, 0x8850) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 179.268216][ C1] sd 0:0:1:0: tag#975 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 179.278089][ C1] sd 0:0:1:0: tag#975 CDB: opcode=0xe5 (vendor) [ 179.284324][ C1] sd 0:0:1:0: tag#975 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 179.293274][ C1] sd 0:0:1:0: tag#975 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 179.302227][ C1] sd 0:0:1:0: tag#975 CDB[20]: ba [ 179.311268][ C0] sd 0:0:1:0: tag#976 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 179.321078][ C0] sd 0:0:1:0: tag#976 CDB: opcode=0xe5 (vendor) [ 179.323635][T27600] FAT-fs (loop4): bogus number of reserved sectors [ 179.327363][ C0] sd 0:0:1:0: tag#976 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 179.327385][ C0] sd 0:0:1:0: tag#976 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 179.333855][T27600] FAT-fs (loop4): Can't find a valid FAT filesystem [ 179.342799][ C0] sd 0:0:1:0: tag#976 CDB[20]: ba 17:16:07 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="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", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r4], 0xf8, 0x40000}}], 0x4, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="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", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r7], 0xf8, 0x40000}}], 0x4, 0x0) r8 = openat$cgroup_freezer_state(r1, &(0x7f00000009c0), 0x2, 0x0) r9 = accept4$bt_l2cap(r1, &(0x7f0000000a00)={0x1f, 0x0, @fixed}, &(0x7f0000000a40)=0xe, 0x80800) r10 = syz_open_pts(r1, 0x40001) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000180)="e176ba131f83faf02b7780c7c1a1bbd7467a14785eaa11f86016ecefcd1ae84915cc3143f716650fcf5775672bf452dcab2fe547f7836fb95ef6f032ff342c551fee375b98ee647cc281fc36e5c0e4ce7f3e4a72b80b78b48de7dfc81cdb3a94536f86e10faec7cec11d36850c25a7ea7b36ba4b21f511e63c11fa9c9d9f8cc4eccff3a040a8c03f8bf34db3bd0dcfd4", 0x90}, {&(0x7f0000000240)="4fe14af01f6639e7f5e63f3c8f44ca49878a0abd227be0debe85985e09c3e58289abbcb7b3a81ad4963154af366d3e98b513b1db7696fbb40f38346ab5bc2826c701452e93fec257124df2489e7097cb5494155d45f2dfbc6b30ce8005b692b9cbf31ab0de05456c29f3a6c38856a4ac32d410c1d3652e272e9e22d29f69fe07be5eb8e3d161fc0c7ae0369b5d78b50dbb58c6255ede387b11c9ca4fa3f6bb6c79", 0xa1}, {&(0x7f0000000080)="9db8d3eefafea7c6b24e33293dd969a4285cde2ecb703b9b45ae0c4dbe6483641c6698b554b9cda651fd74e746d7e144e3b78ba65177cbdb0bde74b896c048a5e9d831881ba6d8529adbd489aab1ba19c18f10c9be3829f3508a26ac92d89c7052518d1193cad3aae5981e9ac2db5f343e", 0x71}, {&(0x7f0000000380)="afa33499941d9d77f0f418fa84a90b207dd65aad60edc9d8c11517c7169ffc2f1dbd5f03639531a5229e9a2d83aa9d251a256f0feee170358d71d461fe9c1349ad78b0b2dc", 0x45}, {&(0x7f0000000300)="ef5082c4a8a42b2aec9206ebef", 0xd}, {&(0x7f0000000400)="57a5cb8241cc8d9b286e3f75060663501ef3589854e77852b2acb87a072554314c880bb12257c943d2587274279d22c76a4304f82112684cb7bece24abdd133264ccdd4b5906fea7f13b8131ba5b725dc6cfc6d17b9ca3333e2037cc7dbb681f6d415e738f93e76077f675a5eccb12ec45f1e8d9a5f9a47b746c6015f0d710b8b0ad265774414e99b310f8b5fecac01b812d217378b78042c9f3647f123fc18144813d1832d34dc4f753afa12924e29153ce5413c1", 0xb5}, {&(0x7f00000004c0)="618bddc9ec03a47e879fbbe7bca1e0902da27e442997a815fab726fd03279a98ccbc4924f03388d2e5cb5ed9b8", 0x2d}, {&(0x7f0000000500)="e228f54409df82c017d862f3c738840830edb53ff7a6ea9197f90da53f8882eaaf84f10faed45fa360135c7f2b5ca024cc7c1e75e2459f1964d0cecf2e509c888ae7176e372f4c1b3392b69fb0e5aedb", 0x50}], 0x8, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @rights={{0x20, 0x1, 0x1, [r8, r0, r9, r10]}}], 0xa0}, 0x8850) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) (async) getegid() (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="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", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r4], 0xf8, 0x40000}}], 0x4, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) (async) getegid() (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="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", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r7], 0xf8, 0x40000}}], 0x4, 0x0) (async) openat$cgroup_freezer_state(r1, &(0x7f00000009c0), 0x2, 0x0) (async) accept4$bt_l2cap(r1, &(0x7f0000000a00)={0x1f, 0x0, @fixed}, &(0x7f0000000a40)=0xe, 0x80800) (async) syz_open_pts(r1, 0x40001) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000180)="e176ba131f83faf02b7780c7c1a1bbd7467a14785eaa11f86016ecefcd1ae84915cc3143f716650fcf5775672bf452dcab2fe547f7836fb95ef6f032ff342c551fee375b98ee647cc281fc36e5c0e4ce7f3e4a72b80b78b48de7dfc81cdb3a94536f86e10faec7cec11d36850c25a7ea7b36ba4b21f511e63c11fa9c9d9f8cc4eccff3a040a8c03f8bf34db3bd0dcfd4", 0x90}, {&(0x7f0000000240)="4fe14af01f6639e7f5e63f3c8f44ca49878a0abd227be0debe85985e09c3e58289abbcb7b3a81ad4963154af366d3e98b513b1db7696fbb40f38346ab5bc2826c701452e93fec257124df2489e7097cb5494155d45f2dfbc6b30ce8005b692b9cbf31ab0de05456c29f3a6c38856a4ac32d410c1d3652e272e9e22d29f69fe07be5eb8e3d161fc0c7ae0369b5d78b50dbb58c6255ede387b11c9ca4fa3f6bb6c79", 0xa1}, {&(0x7f0000000080)="9db8d3eefafea7c6b24e33293dd969a4285cde2ecb703b9b45ae0c4dbe6483641c6698b554b9cda651fd74e746d7e144e3b78ba65177cbdb0bde74b896c048a5e9d831881ba6d8529adbd489aab1ba19c18f10c9be3829f3508a26ac92d89c7052518d1193cad3aae5981e9ac2db5f343e", 0x71}, {&(0x7f0000000380)="afa33499941d9d77f0f418fa84a90b207dd65aad60edc9d8c11517c7169ffc2f1dbd5f03639531a5229e9a2d83aa9d251a256f0feee170358d71d461fe9c1349ad78b0b2dc", 0x45}, {&(0x7f0000000300)="ef5082c4a8a42b2aec9206ebef", 0xd}, {&(0x7f0000000400)="57a5cb8241cc8d9b286e3f75060663501ef3589854e77852b2acb87a072554314c880bb12257c943d2587274279d22c76a4304f82112684cb7bece24abdd133264ccdd4b5906fea7f13b8131ba5b725dc6cfc6d17b9ca3333e2037cc7dbb681f6d415e738f93e76077f675a5eccb12ec45f1e8d9a5f9a47b746c6015f0d710b8b0ad265774414e99b310f8b5fecac01b812d217378b78042c9f3647f123fc18144813d1832d34dc4f753afa12924e29153ce5413c1", 0xb5}, {&(0x7f00000004c0)="618bddc9ec03a47e879fbbe7bca1e0902da27e442997a815fab726fd03279a98ccbc4924f03388d2e5cb5ed9b8", 0x2d}, {&(0x7f0000000500)="e228f54409df82c017d862f3c738840830edb53ff7a6ea9197f90da53f8882eaaf84f10faed45fa360135c7f2b5ca024cc7c1e75e2459f1964d0cecf2e509c888ae7176e372f4c1b3392b69fb0e5aedb", 0x50}], 0x8, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @rights={{0x20, 0x1, 0x1, [r8, r0, r9, r10]}}], 0xa0}, 0x8850) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) [ 179.441861][ C1] sd 0:0:1:0: tag#977 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 179.451636][ C1] sd 0:0:1:0: tag#977 CDB: opcode=0xe5 (vendor) [ 179.457922][ C1] sd 0:0:1:0: tag#977 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 179.466867][ C1] sd 0:0:1:0: tag#977 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 179.475802][ C1] sd 0:0:1:0: tag#977 CDB[20]: ba [ 179.483038][ C0] sd 0:0:1:0: tag#978 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 179.492810][ C0] sd 0:0:1:0: tag#978 CDB: opcode=0xe5 (vendor) [ 179.499100][ C0] sd 0:0:1:0: tag#978 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 179.508049][ C0] sd 0:0:1:0: tag#978 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 179.517105][ C0] sd 0:0:1:0: tag#978 CDB[20]: ba 17:16:07 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="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", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r4], 0xf8, 0x40000}}], 0x4, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="4bf1496cfc976046158ca45196c0b36b45e31b5d5a8d93e4f9ecdf725b090647becdd608f7899681f36fac3bdc14090bb9202e3a7c31dcd2a75f2e5b1741d2103c0e15ea8f524c65e01c121f84ea3704134faf66af0b8d83ba8df86860b886e384e264e3acbb73888d812cb54a44d560a5ce33856c5f2d33ea09d75a1ef71bbf3ce0c62f4a78a0d3b7e78e687a099f8298566f53f7af4668e470c074110846f1e74a2190ad477243c61e494fbc06832784f4c8889b75abc56542315c3a774426d8f26a714f99fff419d0a5a3310718bbf38878d557f56333f7ec0ffe123368101aa2bc9e65e8e9dd1791a8168f050a022b5c1224d64bf28ef2569310568fd99faeed956849d45cf0314ced68d418c3c9305dcaf53b695d2186841d6d86ef4dabb3fcc18cd4b50fde43b70c843af3b23a723e08f3594006c138abcb2db8746fb2d0c6d03ab6b2633f166f7b185cd46191cfe4682bff564aae4e57e5cad38c70c623898d5f1a98178dffeec517e4723c674b6d82626744a4cddc3a87dd11f9874be0941e442ab5de03ff55042707fb47a2b79a28c3f2e25a3b0990b5365932dd0d328f83cff3aab6f4e0ab7aa74170c55870211a0601697ddd7e15ad16f016f24d40dde25530a8bafb9bce4570ef0dde1e20f42fdabafb546cd7d3d3f47ceb15de80cde5e2d6cc5e65aa2a31c01d9c9963b1f871770ed80744eea7acf73d51eb5343f685113079ff5d76c76d80434199756613b0f8529e807c7898a92da76a9ca5e15885fdfe80ee763593822224fb03ad90ba95681dc8e97bf429c5095f412c1ac3162c76329fb6b88244e06351845e3950daa2a05b09764cd4dff1101a4cd6ac83185064c2609d5f3bf3a87c8b87f8b5aa3ee7e7edad7c1079de612021ebbafa35217579ebfdc6983d887563f21a04406c0fcf9b76068886622eb01c69d90c84b0cc84b8163e473b571bb039209137f05de1f632da812d7181d814da60c7534a3ad505c7c174f10b5fabcaf75bc676971c73624eb45edba404722864670bcc1bfee62479525acf0c54663c4dfd1b6dad34f021dc911c3443d66b9e43c8648e80add2891ebf801bcd6338f768fdc1796f470c7e2186db3e649fa823a7f887677168d18400915193994c1d3cdb34bf26902d5a2edcf262b4e662459194568d0b1d4f4d59fa5106a5010d9c3f540e6a435876d63b02c1242da90e165436f32b230d27e643eb74b7f9a799c148c629de16070a4d0d8cce1f8123e358602e6bd832abb26bcbbb9dfd8bc0c886639c14d3262d393d15cfb9f1bffe4408b62ed862cdd5073d4a864dd9459ff5dd460df1ca6bdc6819f7840f60ed95923de584c691575a7aea4111cbf20e2d5f47eff94d9c2f9eb7bd376c0c6642ce45e688dcf1e212562c3ab88c049361dbfa099a2f60afad83b527aa165bad96d89d099c9680db299f3db7c01486481014ef5012dfb38ebcfea2c8d98a873d5d99e3104fe87eef0fb94d2a62afc940d7da33e51913b4d6a5886697ab3efbe5be6b6d2012b9c74a9da65d123d04a851c85f109306af30eff0bd15c0c467d2594b94a9b9947da6f9bd874efce76b7cc182a4707c9697778ca08a20d8de958af434714043efef30c583f75f8f4b0c0dbc95b6b6657b85296e85c36647d4e88387787fea8e90c2de41ede94366b3486e6fa94142256b08b2369c1dafa9dda58fc3261a7ee7ee615ac877eff4b97eb9e4acc028893ab9710bbe46029961d22ebe4802880bc16810e5079764c02d36226ad2ff7f57bb4a7bf6f6227e66fcd52e938c19c309ab2603096c335d4f3adfc154a2e8edf34d43bd27b7cb868034ea9a95b4b992ed032a72a707d9f7d3a7909aff7948bd45ae08aaaef4872b2cb079170da5e5dc4c5b49811e81f1a46e8a10fd99caf212d1a96d10d535f7d2977eeece20dd949ecaaed7cf13be6f9e8f9edf84e7ed26aecda122913f1f690593cc1e6e47bb26214d94248e1fdffe095ba5d86fe61e8e818f7d1f23ae5755b0528d6b3e6ec2a3f8fc48f9d112358bd510bf4126ef2989861c2ae39e2c219964bf7e69756d9c19b857965c5e33d643c404f295515d886bc0dbc7ad173f70cf813d02464cd966cfa480e96924493e6af86d641d6f2b4908ca0e6f5d7de40b34d1a1d6fcf01329d043870de923ddc3cb2abbb0822308d92c0fa150b817cd75489b7647bfee2241387b2ad9d2094e7e124670c245b58da4e219d9dcfd770fd6a690b40a149c0141478da4ce8af98dc04bb366e53d7eaa6e80dfe6e68ba930cb04a7cb19a16bab2fa38f1c6e40edebfed5348a5793751730f184eedd8e8a5dd0bc116768", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r7], 0xf8, 0x40000}}], 0x4, 0x0) r8 = openat$cgroup_freezer_state(r1, &(0x7f00000009c0), 0x2, 0x0) r9 = accept4$bt_l2cap(r1, &(0x7f0000000a00)={0x1f, 0x0, @fixed}, &(0x7f0000000a40)=0xe, 0x80800) r10 = syz_open_pts(r1, 0x40001) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000180)="e176ba131f83faf02b7780c7c1a1bbd7467a14785eaa11f86016ecefcd1ae84915cc3143f716650fcf5775672bf452dcab2fe547f7836fb95ef6f032ff342c551fee375b98ee647cc281fc36e5c0e4ce7f3e4a72b80b78b48de7dfc81cdb3a94536f86e10faec7cec11d36850c25a7ea7b36ba4b21f511e63c11fa9c9d9f8cc4eccff3a040a8c03f8bf34db3bd0dcfd4", 0x90}, {&(0x7f0000000240)="4fe14af01f6639e7f5e63f3c8f44ca49878a0abd227be0debe85985e09c3e58289abbcb7b3a81ad4963154af366d3e98b513b1db7696fbb40f38346ab5bc2826c701452e93fec257124df2489e7097cb5494155d45f2dfbc6b30ce8005b692b9cbf31ab0de05456c29f3a6c38856a4ac32d410c1d3652e272e9e22d29f69fe07be5eb8e3d161fc0c7ae0369b5d78b50dbb58c6255ede387b11c9ca4fa3f6bb6c79", 0xa1}, {&(0x7f0000000080)="9db8d3eefafea7c6b24e33293dd969a4285cde2ecb703b9b45ae0c4dbe6483641c6698b554b9cda651fd74e746d7e144e3b78ba65177cbdb0bde74b896c048a5e9d831881ba6d8529adbd489aab1ba19c18f10c9be3829f3508a26ac92d89c7052518d1193cad3aae5981e9ac2db5f343e", 0x71}, {&(0x7f0000000380)="afa33499941d9d77f0f418fa84a90b207dd65aad60edc9d8c11517c7169ffc2f1dbd5f03639531a5229e9a2d83aa9d251a256f0feee170358d71d461fe9c1349ad78b0b2dc", 0x45}, {&(0x7f0000000300)="ef5082c4a8a42b2aec9206ebef", 0xd}, {&(0x7f0000000400)="57a5cb8241cc8d9b286e3f75060663501ef3589854e77852b2acb87a072554314c880bb12257c943d2587274279d22c76a4304f82112684cb7bece24abdd133264ccdd4b5906fea7f13b8131ba5b725dc6cfc6d17b9ca3333e2037cc7dbb681f6d415e738f93e76077f675a5eccb12ec45f1e8d9a5f9a47b746c6015f0d710b8b0ad265774414e99b310f8b5fecac01b812d217378b78042c9f3647f123fc18144813d1832d34dc4f753afa12924e29153ce5413c1", 0xb5}, {&(0x7f00000004c0)="618bddc9ec03a47e879fbbe7bca1e0902da27e442997a815fab726fd03279a98ccbc4924f03388d2e5cb5ed9b8", 0x2d}, {&(0x7f0000000500)="e228f54409df82c017d862f3c738840830edb53ff7a6ea9197f90da53f8882eaaf84f10faed45fa360135c7f2b5ca024cc7c1e75e2459f1964d0cecf2e509c888ae7176e372f4c1b3392b69fb0e5aedb", 0x50}], 0x8, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @rights={{0x20, 0x1, 0x1, [r8, r0, r9, r10]}}], 0xa0}, 0x8850) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) (async) getegid() (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="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", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r4], 0xf8, 0x40000}}], 0x4, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) (async) getegid() (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040804}}, {{&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYBLOB="1c7ad122a91553a778d9a5a0409c469f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd0}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)="a5c9e797a8aa2bcee3a6e120288e87af1cc7fd60446f510d7a7da08a68ef3138ffba7e9e497e4b1fce9a9480b387cbf13cf259578e3fa98acd162c644de9876bfc3b841501d15f951fa25eca53619fd3d071190424ad2cebc85609c7438ad04d5c7d8c2f5f4fbd444c185d0631625394ceb05a0263e212c30a9341ef13779e30530382c2dcacc8a813801bb2af7ccea2", 0x90}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB=' \x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000000802", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0000000018", @ANYBLOB="1400000000", @ANYRES32, @ANYBLOB="00000000dab770b5467cce090000005de71c1507826117eed8e2abd500b1fa5feea002ea44100dd9a94cff2cc9eec5d9dcef444f9992f00f73cedfef040000000000000006000000d0a9d9e7"], 0xd0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005900)=[{0x0}, {&(0x7f0000004840)="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", 0x672}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="3800000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32, @ANYBLOB='\x00\x00\x00\x000', @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r7], 0xf8, 0x40000}}], 0x4, 0x0) (async) openat$cgroup_freezer_state(r1, &(0x7f00000009c0), 0x2, 0x0) (async) accept4$bt_l2cap(r1, &(0x7f0000000a00)={0x1f, 0x0, @fixed}, &(0x7f0000000a40)=0xe, 0x80800) (async) syz_open_pts(r1, 0x40001) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000180)="e176ba131f83faf02b7780c7c1a1bbd7467a14785eaa11f86016ecefcd1ae84915cc3143f716650fcf5775672bf452dcab2fe547f7836fb95ef6f032ff342c551fee375b98ee647cc281fc36e5c0e4ce7f3e4a72b80b78b48de7dfc81cdb3a94536f86e10faec7cec11d36850c25a7ea7b36ba4b21f511e63c11fa9c9d9f8cc4eccff3a040a8c03f8bf34db3bd0dcfd4", 0x90}, {&(0x7f0000000240)="4fe14af01f6639e7f5e63f3c8f44ca49878a0abd227be0debe85985e09c3e58289abbcb7b3a81ad4963154af366d3e98b513b1db7696fbb40f38346ab5bc2826c701452e93fec257124df2489e7097cb5494155d45f2dfbc6b30ce8005b692b9cbf31ab0de05456c29f3a6c38856a4ac32d410c1d3652e272e9e22d29f69fe07be5eb8e3d161fc0c7ae0369b5d78b50dbb58c6255ede387b11c9ca4fa3f6bb6c79", 0xa1}, {&(0x7f0000000080)="9db8d3eefafea7c6b24e33293dd969a4285cde2ecb703b9b45ae0c4dbe6483641c6698b554b9cda651fd74e746d7e144e3b78ba65177cbdb0bde74b896c048a5e9d831881ba6d8529adbd489aab1ba19c18f10c9be3829f3508a26ac92d89c7052518d1193cad3aae5981e9ac2db5f343e", 0x71}, {&(0x7f0000000380)="afa33499941d9d77f0f418fa84a90b207dd65aad60edc9d8c11517c7169ffc2f1dbd5f03639531a5229e9a2d83aa9d251a256f0feee170358d71d461fe9c1349ad78b0b2dc", 0x45}, {&(0x7f0000000300)="ef5082c4a8a42b2aec9206ebef", 0xd}, {&(0x7f0000000400)="57a5cb8241cc8d9b286e3f75060663501ef3589854e77852b2acb87a072554314c880bb12257c943d2587274279d22c76a4304f82112684cb7bece24abdd133264ccdd4b5906fea7f13b8131ba5b725dc6cfc6d17b9ca3333e2037cc7dbb681f6d415e738f93e76077f675a5eccb12ec45f1e8d9a5f9a47b746c6015f0d710b8b0ad265774414e99b310f8b5fecac01b812d217378b78042c9f3647f123fc18144813d1832d34dc4f753afa12924e29153ce5413c1", 0xb5}, {&(0x7f00000004c0)="618bddc9ec03a47e879fbbe7bca1e0902da27e442997a815fab726fd03279a98ccbc4924f03388d2e5cb5ed9b8", 0x2d}, {&(0x7f0000000500)="e228f54409df82c017d862f3c738840830edb53ff7a6ea9197f90da53f8882eaaf84f10faed45fa360135c7f2b5ca024cc7c1e75e2459f1964d0cecf2e509c888ae7176e372f4c1b3392b69fb0e5aedb", 0x50}], 0x8, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @rights={{0x20, 0x1, 0x1, [r8, r0, r9, r10]}}], 0xa0}, 0x8850) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) [ 179.632792][ C0] sd 0:0:1:0: tag#1021 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 179.642678][ C0] sd 0:0:1:0: tag#1021 CDB: opcode=0xe5 (vendor) [ 179.649044][ C0] sd 0:0:1:0: tag#1021 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 179.658215][ C0] sd 0:0:1:0: tag#1021 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 179.667277][ C0] sd 0:0:1:0: tag#1021 CDB[20]: ba 17:16:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 179.674298][ C0] sd 0:0:1:0: tag#997 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 179.684084][ C0] sd 0:0:1:0: tag#997 CDB: opcode=0xe5 (vendor) [ 179.690342][ C0] sd 0:0:1:0: tag#997 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 179.699297][ C0] sd 0:0:1:0: tag#997 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 179.708246][ C0] sd 0:0:1:0: tag#997 CDB[20]: ba 17:16:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x0, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) [ 179.749551][T27807] FAT-fs (loop4): bogus number of reserved sectors [ 179.756091][T27807] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:07 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:08 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 180.131534][T27923] FAT-fs (loop4): bogus number of reserved sectors [ 180.138140][T27923] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x0, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) [ 180.674487][T27930] FAT-fs (loop4): bogus number of reserved sectors [ 180.681063][T27930] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:08 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:08 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, 0x0, 0x0) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 181.203143][T27943] FAT-fs (loop4): bogus number of reserved sectors [ 181.209909][T27943] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 181.569972][T27949] loop4: detected capacity change from 0 to 262160 [ 181.579034][T27949] FAT-fs (loop4): bogus number of reserved sectors [ 181.585571][T27949] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:09 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005d240)={0x0, 0x0, "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", "d6e6a9f3ac8a711369d14ca9a527d39a857fe783b592d03c2c9b245fd182db4ba487e1ab95368437a2ce757a917c24678ffc5caa5b18124ac24c4bf96f5e44c39a18095b1a5fac9eccd22957753d3bf59001bcf3f18bb8e37c881f254e5b952962ada1490de20a1f31d85e00c3a28f57c2b0e204f354ac51231ded16cd240072c97aeb27dbe1aee886a31f0727b1e96a8099f6a22081089e3991e3ea09648794c0a05fe8cc98856600ed7aa295ae39412d22f8460ed467fb4183f137b7fdb00603ab9535de328fc3cd1899b76bfd33557a35ed94ce818f3845f68849599727d57b98da642eb40b05474a54db3949403cb24131227069b0b3f0196b331b0e9bc1527e7ddb483db831e4ef44b7e165bc2ecec13efd8e9e0df78e5382bfa2ee4cdc5fd3499ecea027763aa8ac37db3f6c02df37c0b41bf02312d65bcec47d56dc5429a12cc4e6de6cf298ddf7f2071118d0e745e080900b191c469782e558955d32197cbc6ccc698eabb1c09bfc05d2676734470c52371082e71d47dcfba71457890e4ccf84f092cc727f4690b53e1e8a238ad2d6fa80b42f13b3b8e1ff52e8c257d14ed75130caed60b907570818db1546a5110114e93a513f8a0debf7b83200db81da955acdaa349dfc16c290c59940944b91083c7744d50c6e42a038c0931e68f1f9e326d2b8ffc024ae1bfb98cd2497cab5781f3e99b0ba8e23e819985f1f9985cbf6d7a81d8fc0f1c1804a51d5e5a6df03bbb5879636a5f7463bfdcc3662a5ffc5dab6a67b86c6a72ff034d8c3fcfaca2187a0876eabf9a30db7c9ce3cf1e4e6a126bb6efdf5555ccc4f839d491291d1cda247e3c6d65fd0afa60968f693eeb690388c0b011f83ed9241280d2b2fe3b201ff71ff9ca5bb47d51f6c7ee01e0bee16f2a288bc4824b593c16e77cc7ce7866af72a9c03dd8fbfcb3f001383e2243c942df1592d52fce5dd10573d8ddd53588d42c8dce9ae69e9d92ca564ae0477f4475b0ff6f3598217e90dae9a4789c38c63df88af79fc58baea2c90b5c60c0a0f37b8e41d262c5bb08d4ac8e9aafe9e02e79c03a7db5738510799245f2062e4382a9d45b7c400b1a708c67dc8d2a04cbb7e1205ac0f19d144e3f8374802dbe852753999e8175a04be90fda7fb008cdcdbec5aa93735b4cbbd2f7949cc00987793a486b5559274f343f8e8f0130f79a32618c396251eb0e56ec7ff6a92380a640f4ea8eb849cf7bb4e1567876f252462b0f48ec62b18f9add66f52e4165a078fb6fca0cd122613e063f30dfbacebe3fd43afca0e92acce1e7f84583fc45320a589b22edd0909f5766db6be47112b53c96a1c14befd734a989467c268ec9bc0f7cf15fa0e326b945f2a84d53277cb1639be0199931f78db77c9f4e4b5c3f2d197105ce7cf1b7beb7c9e4b9f6baf3fe996dce53139984d39e014928d9cb0ab01cfedd938cdce943b1040a810b200756708f53a3e867f08038bbf93ff7eb0c9ae212651d8dfafe1ac15e70773bed18997277a5bb1b1ddbe24c8465ec8be3b19687dd5be132c6237f5d87ad82b1117f097632c0cc3c54e054c02162c12814f32a8ff6f1df06cb4b4dfa2a7ee12513f77dfea68ca043081ba42ef018a1233bed1cb24278bab3442b1dfa0ddc6a42aa71254d2b03d9c273cbe20b6ed1abddc389dd0c99e696a390b87012aebcf07f588d7e4f2732bf912a3e069c62513c0273da51a0a59a3a91fc01cf6372ad68fcf931b7e73f9cf87f9abd826dc3549f0541395d70450b1a3214f679d900b8b625c813fda5702078784d2f80bab47dd4bb3ee9164262a0ad78b67ea491fbd24e9cb2a8eff595c2fa115b67cfe25ea6d4e746005ec5b4f514a357ad98a1a74cd419ac6398d3a8505d98759ab39670014972984dd93a65e323fced70a19d4569026b16839b86a6572c2ba08b97047e013fd8a327ad4d08dca517b894fb7f40addaada53f07f647d82229c7bcd8623869f265b541b603160a164ed47dbbf0080ff310e334baea6108234e36af67d9dd05610712a3f89e87737f2f2b9b1b164afd60bd0ebb141f6e262009058bc6d6ff2eb3a992d933cf3411b167dae9b9bb7db8c9b2f4c6207cbffe869d438b9cacda77cbaa6299bab346f999d9920beb88acf43459c40f6931ab41bbf36cd1d861d1463cb27afa2e5630930e4918dc86e786105255ddf425ace423ec8d4ffb183de877f8dd666ea85ce6f563ed3814bdc28a9bf9fc640763eab5de8e469ae5550540e5982048d97d19d976dd5f5034528d7b3a07f47686e74708c8f6cd81b10ea2e67e32dd65d6908a6439e3f904f43cab1f0f0c5fdff9983ca0bcc51d0848cda76870a5b5aa40112a6b55561d27d28e36d2afa5df7e5eb42da8d115241ab6ba4055e49bd6c289bc8846523ae961b60cef775fb682861c2a2b6f43bfc41f806b4c890c1585b0394b0b113d2ceb444375f145e053d79110c7ea5be454b9838f18b9d42eec0590118862f56aa1dac86175aa7944ca761b87e6e5b720cc1d9574075a6a58d1f7d3a11c031841e54cabdce4872ec1b5854ff9494588f03428871f78f948c212d6202fa4cb471ec5e89f1f6e9aeb4174f21f2e55d7f9ef64fe9aba82711729a14b35b177b8f5c000a34d14ce65be071b5044467efd3a41ef1a8ed0ef06fb5fe536ed8cd949e7a631bd4c3652fa75351ae57655cc364d6e5b4f60c4d68b41f3e642603ecf5d21c5502ccaa0ea64e43c8a52294313c98ac8eddbb7eb790e382c223e2d57991a00dcce02a4bc540fa9685fb26a6e0062ef627deb6508ba8ae0a73869aa23692308145b68590affabfa53b9cac4c83f82d33366f4a82cb5be5b485609195713ede4722339274f7f10b9d74fcf3a4afbe97b18b8d88a203b52afda4bed1a14266e59365fe7a8b08a5247db15d0b2f7c07a29485aeac872b3e3a5d26b585e73b88d574a581f1240daf6a20275079c40ac54b9ddbc09642bbc3912b6fbd79bc9d1acd193b906fa86432f755b73755a9ef322faa1b36d7525869fabfac9865a62acbf90488b07f705c875175db5b32b0339cd6dd42381a854644b627e0271542eb2b32bb14b83541e8761274be04a49d419853bb00bfb121fb63b5a7c6cd32b966ced3058284e101a68e438301098c5049e91d3079a5fc3a36f4a7dec45c588fae8749cc36b82dfa1a3d989ed071863425019efdd2163a126b2682ca019540ae5f29ad839509ed72653986e0127c467cd74bcbf09a64defe18fd50555be1248f6d3324ba6022a8e871fb2a2565cc1f9344f95b208fa6f7813fd136e6d50c619fe02d1b75623af3e3e63f9d409ba0c69266e0461bbf3eb9e2afabf159e08151914b3a1cf5ba8747ae9c6257ded2d075f82af98cd9da15e7b01d0ad884743572666921b74efee6f4a69aca5616170097f93b825afc47112176fff01372a23d5e2dfce80dc23ccb29106ff4f9cd770119fba06ac9290bfd64dd68fae8ac897160bc19d1f453c53591fd075744265dca119aa83a73f2f72a71f0f1164441d76fe259e4e763804c4e68626add47f88d1bc1b552135d2e812cc47b63cf5cd703f774722af81df3009fc149b9b9694b6f232971eaf7d63c615087a40348bb4804f452bf0d785898d0c4afa43e1394d650818705959b2a4b99177334911f069eac006f5626757aa1d61537a67cfe7671828159e4970e6051e4acbcbe3eccf422a02c3537d14527694e52b2b1d4bb486556d4260150e2eca88342294b63c760fc9ca471b85f108cf1d855a0f05542878ae27f64ee6e0bb53cfdaa6d20e5d5287dcc9de8d38111f7007d38352f256a103bc31c0269f34785e983d20ee5d3001f688bf0beb7156d8305b97ba6c8105f4fa0e3de1b4fee497b108a9d87e9670216f0bec2713b65a23efba2769bcd77438b1f9d092015f5bbc5a6b966d3afa621052820a25dace185ce71e7b66dadf175431bdba795b60a7db31eb3b2c1bcad6e612f18a2dd9040befc58c042512e3346ccbd5290449ba82ba9d23dccffe598e6f15832a910358ddf686003c7118e712abed61032349557c5724db81127a2cdfec97706c22fb80d4492f65ad11e21f7c4ac069fe6a80d839d35c1cd2d50cbaf2410a3467b639335749d4cca2c2b9b468eedc6c8bb37b6b1ba301c98cfd6e0c18c285d96431e451c89811777f18e54608315c31d92304eb4c82cb63e371be5db17c4f1bc15ae4da30f3d4071cb81ab482bdef23900e9e9b1a1465d1aa12bc4d2e9e4c4d555458470a69779f77f4421b4bd192df056bcadbec09e850dc4ed9bbd8bb62d5dfc371cfd037e0172e37643a3a0ef7c293a9dfe17abafda6f4b94d6a7d922cd8c3c64ae87ffd1785344afc813f194befa2a3c86cab3b1f382323243447788a32d34ea28830bacf520a62f69c3dfdf7e74f45e6349ea0dea8cc842755dcd01c2ce84a55e8d74b973ed795be05c364a389b30341aafe481f346e276226ab30db0faf1a5b686db3606867dd18fde44fb6024cd81f92f5fc036633d61bdba4c2d99c638125e2b2c5b0731d07652de38fdabdff027b6537ddb65c334afcd2054a6b6ef53ca0193dc317b09f1e9efa0237c1ac6e216fe2f8fb7c1839a16e572a8277a96abb948f93d931fb3ba9281065a73c6433a44b39025e39524649f2af7dc3ae5cad8293dbeb5c01cbe42f41305cec679495f652a6482ed02d480c84a43c3087a6de8f1b36b9ab068551514a436f77905aba88b53f8020f5c16da2d17cb29e253816c66a22808af536a1dffaa86d09726ad4d4ae0e349b1655cf455d58bc807ff21d2a040e9175cf5a0fa7634eaa1e8dd69633bafdb41936c25ae35084ebd6662da78c174d8ac3c42369810a968367060413f8d4ee130ad74d385626976d09d2d0935030ed898c0c4fd75cbd3e779233dcbfbce69249e7a141959724351a7b0046d0fa835fbe5733637e255a792cc5b459c98614d9fc99dffa85abc9814b1c7c39529764c73cddc82edaf365c745f6ff036ce616b02295a2bee899a540d2fb80a0a627f603d113d5a86b3b9ffad0d9f5877fb27dd06ea6cff53d928cf2ac9c0838ff8ad0939a2c35ecd562b117622b5427b56d1a254b2f8ca0a80d9e78d1abb4f5bf12dfcf9907c06db5afce1d4e457d2a93d1a2562c78ebc1857b9bd353dfdf422e46a47e4614a2348d237f9757a453139bfd0b8eb98f2cb4035d01d0e0c6e7519ce12c3afacb9e6b0d57748fae37c618d17fe8b288a9fbe7468db5521f1d99d942b6710598d25ce1a02ef2648554f112268994cf8e6824d8d40ea29a1e93bf1c2705a5bdedd11678d7439cf7a9be04b34a22957197cd8b918ad04bf5ba07d5637424fe828d5cf247c79ea9bdc0f12ec911623a6ab33033fc04f6cf0a9a1f83529492d8c975e318cfb65dc798c0ada97fa3219d2dd1877"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005e240)={0xa62a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7, "ab208035038e64"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {0x0, r5}], 0x80, "ae0c2fe64f48d1"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005f240)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "b0c978929f24e2"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}], 0x80, "ae0c2fe64f48d1"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000060240)={{0x0, 0x401, 0x4, 0x7, 0x6770332b, 0x7f, 0xb2b5, 0x10000, 0x7a, 0x1, 0x3ff, 0xfffffffffffffffd, 0xab, 0x3, 0x100000001}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061240)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r3}, {r4}, {}, {0x0, r6}, {r7}, {r9}], 0x1f, "759717e2178465"}) write(r0, &(0x7f0000000000)="d442754791bb7c2d", 0x8) 17:16:09 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:09 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005d240)={0x0, 0x0, "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", "d6e6a9f3ac8a711369d14ca9a527d39a857fe783b592d03c2c9b245fd182db4ba487e1ab95368437a2ce757a917c24678ffc5caa5b18124ac24c4bf96f5e44c39a18095b1a5fac9eccd22957753d3bf59001bcf3f18bb8e37c881f254e5b952962ada1490de20a1f31d85e00c3a28f57c2b0e204f354ac51231ded16cd240072c97aeb27dbe1aee886a31f0727b1e96a8099f6a22081089e3991e3ea09648794c0a05fe8cc98856600ed7aa295ae39412d22f8460ed467fb4183f137b7fdb00603ab9535de328fc3cd1899b76bfd33557a35ed94ce818f3845f68849599727d57b98da642eb40b05474a54db3949403cb24131227069b0b3f0196b331b0e9bc1527e7ddb483db831e4ef44b7e165bc2ecec13efd8e9e0df78e5382bfa2ee4cdc5fd3499ecea027763aa8ac37db3f6c02df37c0b41bf02312d65bcec47d56dc5429a12cc4e6de6cf298ddf7f2071118d0e745e080900b191c469782e558955d32197cbc6ccc698eabb1c09bfc05d2676734470c52371082e71d47dcfba71457890e4ccf84f092cc727f4690b53e1e8a238ad2d6fa80b42f13b3b8e1ff52e8c257d14ed75130caed60b907570818db1546a5110114e93a513f8a0debf7b83200db81da955acdaa349dfc16c290c59940944b91083c7744d50c6e42a038c0931e68f1f9e326d2b8ffc024ae1bfb98cd2497cab5781f3e99b0ba8e23e819985f1f9985cbf6d7a81d8fc0f1c1804a51d5e5a6df03bbb5879636a5f7463bfdcc3662a5ffc5dab6a67b86c6a72ff034d8c3fcfaca2187a0876eabf9a30db7c9ce3cf1e4e6a126bb6efdf5555ccc4f839d491291d1cda247e3c6d65fd0afa60968f693eeb690388c0b011f83ed9241280d2b2fe3b201ff71ff9ca5bb47d51f6c7ee01e0bee16f2a288bc4824b593c16e77cc7ce7866af72a9c03dd8fbfcb3f001383e2243c942df1592d52fce5dd10573d8ddd53588d42c8dce9ae69e9d92ca564ae0477f4475b0ff6f3598217e90dae9a4789c38c63df88af79fc58baea2c90b5c60c0a0f37b8e41d262c5bb08d4ac8e9aafe9e02e79c03a7db5738510799245f2062e4382a9d45b7c400b1a708c67dc8d2a04cbb7e1205ac0f19d144e3f8374802dbe852753999e8175a04be90fda7fb008cdcdbec5aa93735b4cbbd2f7949cc00987793a486b5559274f343f8e8f0130f79a32618c396251eb0e56ec7ff6a92380a640f4ea8eb849cf7bb4e1567876f252462b0f48ec62b18f9add66f52e4165a078fb6fca0cd122613e063f30dfbacebe3fd43afca0e92acce1e7f84583fc45320a589b22edd0909f5766db6be47112b53c96a1c14befd734a989467c268ec9bc0f7cf15fa0e326b945f2a84d53277cb1639be0199931f78db77c9f4e4b5c3f2d197105ce7cf1b7beb7c9e4b9f6baf3fe996dce53139984d39e014928d9cb0ab01cfedd938cdce943b1040a810b200756708f53a3e867f08038bbf93ff7eb0c9ae212651d8dfafe1ac15e70773bed18997277a5bb1b1ddbe24c8465ec8be3b19687dd5be132c6237f5d87ad82b1117f097632c0cc3c54e054c02162c12814f32a8ff6f1df06cb4b4dfa2a7ee12513f77dfea68ca043081ba42ef018a1233bed1cb24278bab3442b1dfa0ddc6a42aa71254d2b03d9c273cbe20b6ed1abddc389dd0c99e696a390b87012aebcf07f588d7e4f2732bf912a3e069c62513c0273da51a0a59a3a91fc01cf6372ad68fcf931b7e73f9cf87f9abd826dc3549f0541395d70450b1a3214f679d900b8b625c813fda5702078784d2f80bab47dd4bb3ee9164262a0ad78b67ea491fbd24e9cb2a8eff595c2fa115b67cfe25ea6d4e746005ec5b4f514a357ad98a1a74cd419ac6398d3a8505d98759ab39670014972984dd93a65e323fced70a19d4569026b16839b86a6572c2ba08b97047e013fd8a327ad4d08dca517b894fb7f40addaada53f07f647d82229c7bcd8623869f265b541b603160a164ed47dbbf0080ff310e334baea6108234e36af67d9dd05610712a3f89e87737f2f2b9b1b164afd60bd0ebb141f6e262009058bc6d6ff2eb3a992d933cf3411b167dae9b9bb7db8c9b2f4c6207cbffe869d438b9cacda77cbaa6299bab346f999d9920beb88acf43459c40f6931ab41bbf36cd1d861d1463cb27afa2e5630930e4918dc86e786105255ddf425ace423ec8d4ffb183de877f8dd666ea85ce6f563ed3814bdc28a9bf9fc640763eab5de8e469ae5550540e5982048d97d19d976dd5f5034528d7b3a07f47686e74708c8f6cd81b10ea2e67e32dd65d6908a6439e3f904f43cab1f0f0c5fdff9983ca0bcc51d0848cda76870a5b5aa40112a6b55561d27d28e36d2afa5df7e5eb42da8d115241ab6ba4055e49bd6c289bc8846523ae961b60cef775fb682861c2a2b6f43bfc41f806b4c890c1585b0394b0b113d2ceb444375f145e053d79110c7ea5be454b9838f18b9d42eec0590118862f56aa1dac86175aa7944ca761b87e6e5b720cc1d9574075a6a58d1f7d3a11c031841e54cabdce4872ec1b5854ff9494588f03428871f78f948c212d6202fa4cb471ec5e89f1f6e9aeb4174f21f2e55d7f9ef64fe9aba82711729a14b35b177b8f5c000a34d14ce65be071b5044467efd3a41ef1a8ed0ef06fb5fe536ed8cd949e7a631bd4c3652fa75351ae57655cc364d6e5b4f60c4d68b41f3e642603ecf5d21c5502ccaa0ea64e43c8a52294313c98ac8eddbb7eb790e382c223e2d57991a00dcce02a4bc540fa9685fb26a6e0062ef627deb6508ba8ae0a73869aa23692308145b68590affabfa53b9cac4c83f82d33366f4a82cb5be5b485609195713ede4722339274f7f10b9d74fcf3a4afbe97b18b8d88a203b52afda4bed1a14266e59365fe7a8b08a5247db15d0b2f7c07a29485aeac872b3e3a5d26b585e73b88d574a581f1240daf6a20275079c40ac54b9ddbc09642bbc3912b6fbd79bc9d1acd193b906fa86432f755b73755a9ef322faa1b36d7525869fabfac9865a62acbf90488b07f705c875175db5b32b0339cd6dd42381a854644b627e0271542eb2b32bb14b83541e8761274be04a49d419853bb00bfb121fb63b5a7c6cd32b966ced3058284e101a68e438301098c5049e91d3079a5fc3a36f4a7dec45c588fae8749cc36b82dfa1a3d989ed071863425019efdd2163a126b2682ca019540ae5f29ad839509ed72653986e0127c467cd74bcbf09a64defe18fd50555be1248f6d3324ba6022a8e871fb2a2565cc1f9344f95b208fa6f7813fd136e6d50c619fe02d1b75623af3e3e63f9d409ba0c69266e0461bbf3eb9e2afabf159e08151914b3a1cf5ba8747ae9c6257ded2d075f82af98cd9da15e7b01d0ad884743572666921b74efee6f4a69aca5616170097f93b825afc47112176fff01372a23d5e2dfce80dc23ccb29106ff4f9cd770119fba06ac9290bfd64dd68fae8ac897160bc19d1f453c53591fd075744265dca119aa83a73f2f72a71f0f1164441d76fe259e4e763804c4e68626add47f88d1bc1b552135d2e812cc47b63cf5cd703f774722af81df3009fc149b9b9694b6f232971eaf7d63c615087a40348bb4804f452bf0d785898d0c4afa43e1394d650818705959b2a4b99177334911f069eac006f5626757aa1d61537a67cfe7671828159e4970e6051e4acbcbe3eccf422a02c3537d14527694e52b2b1d4bb486556d4260150e2eca88342294b63c760fc9ca471b85f108cf1d855a0f05542878ae27f64ee6e0bb53cfdaa6d20e5d5287dcc9de8d38111f7007d38352f256a103bc31c0269f34785e983d20ee5d3001f688bf0beb7156d8305b97ba6c8105f4fa0e3de1b4fee497b108a9d87e9670216f0bec2713b65a23efba2769bcd77438b1f9d092015f5bbc5a6b966d3afa621052820a25dace185ce71e7b66dadf175431bdba795b60a7db31eb3b2c1bcad6e612f18a2dd9040befc58c042512e3346ccbd5290449ba82ba9d23dccffe598e6f15832a910358ddf686003c7118e712abed61032349557c5724db81127a2cdfec97706c22fb80d4492f65ad11e21f7c4ac069fe6a80d839d35c1cd2d50cbaf2410a3467b639335749d4cca2c2b9b468eedc6c8bb37b6b1ba301c98cfd6e0c18c285d96431e451c89811777f18e54608315c31d92304eb4c82cb63e371be5db17c4f1bc15ae4da30f3d4071cb81ab482bdef23900e9e9b1a1465d1aa12bc4d2e9e4c4d555458470a69779f77f4421b4bd192df056bcadbec09e850dc4ed9bbd8bb62d5dfc371cfd037e0172e37643a3a0ef7c293a9dfe17abafda6f4b94d6a7d922cd8c3c64ae87ffd1785344afc813f194befa2a3c86cab3b1f382323243447788a32d34ea28830bacf520a62f69c3dfdf7e74f45e6349ea0dea8cc842755dcd01c2ce84a55e8d74b973ed795be05c364a389b30341aafe481f346e276226ab30db0faf1a5b686db3606867dd18fde44fb6024cd81f92f5fc036633d61bdba4c2d99c638125e2b2c5b0731d07652de38fdabdff027b6537ddb65c334afcd2054a6b6ef53ca0193dc317b09f1e9efa0237c1ac6e216fe2f8fb7c1839a16e572a8277a96abb948f93d931fb3ba9281065a73c6433a44b39025e39524649f2af7dc3ae5cad8293dbeb5c01cbe42f41305cec679495f652a6482ed02d480c84a43c3087a6de8f1b36b9ab068551514a436f77905aba88b53f8020f5c16da2d17cb29e253816c66a22808af536a1dffaa86d09726ad4d4ae0e349b1655cf455d58bc807ff21d2a040e9175cf5a0fa7634eaa1e8dd69633bafdb41936c25ae35084ebd6662da78c174d8ac3c42369810a968367060413f8d4ee130ad74d385626976d09d2d0935030ed898c0c4fd75cbd3e779233dcbfbce69249e7a141959724351a7b0046d0fa835fbe5733637e255a792cc5b459c98614d9fc99dffa85abc9814b1c7c39529764c73cddc82edaf365c745f6ff036ce616b02295a2bee899a540d2fb80a0a627f603d113d5a86b3b9ffad0d9f5877fb27dd06ea6cff53d928cf2ac9c0838ff8ad0939a2c35ecd562b117622b5427b56d1a254b2f8ca0a80d9e78d1abb4f5bf12dfcf9907c06db5afce1d4e457d2a93d1a2562c78ebc1857b9bd353dfdf422e46a47e4614a2348d237f9757a453139bfd0b8eb98f2cb4035d01d0e0c6e7519ce12c3afacb9e6b0d57748fae37c618d17fe8b288a9fbe7468db5521f1d99d942b6710598d25ce1a02ef2648554f112268994cf8e6824d8d40ea29a1e93bf1c2705a5bdedd11678d7439cf7a9be04b34a22957197cd8b918ad04bf5ba07d5637424fe828d5cf247c79ea9bdc0f12ec911623a6ab33033fc04f6cf0a9a1f83529492d8c975e318cfb65dc798c0ada97fa3219d2dd1877"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005e240)={0xa62a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7, "ab208035038e64"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {0x0, r5}], 0x80, "ae0c2fe64f48d1"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005f240)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "b0c978929f24e2"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}], 0x80, "ae0c2fe64f48d1"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000060240)={{0x0, 0x401, 0x4, 0x7, 0x6770332b, 0x7f, 0xb2b5, 0x10000, 0x7a, 0x1, 0x3ff, 0xfffffffffffffffd, 0xab, 0x3, 0x100000001}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061240)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r3}, {r4}, {}, {0x0, r6}, {r7}, {r9}], 0x1f, "759717e2178465"}) write(r0, &(0x7f0000000000)="d442754791bb7c2d", 0x8) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005d240)={0x0, 0x0, "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", "d6e6a9f3ac8a711369d14ca9a527d39a857fe783b592d03c2c9b245fd182db4ba487e1ab95368437a2ce757a917c24678ffc5caa5b18124ac24c4bf96f5e44c39a18095b1a5fac9eccd22957753d3bf59001bcf3f18bb8e37c881f254e5b952962ada1490de20a1f31d85e00c3a28f57c2b0e204f354ac51231ded16cd240072c97aeb27dbe1aee886a31f0727b1e96a8099f6a22081089e3991e3ea09648794c0a05fe8cc98856600ed7aa295ae39412d22f8460ed467fb4183f137b7fdb00603ab9535de328fc3cd1899b76bfd33557a35ed94ce818f3845f68849599727d57b98da642eb40b05474a54db3949403cb24131227069b0b3f0196b331b0e9bc1527e7ddb483db831e4ef44b7e165bc2ecec13efd8e9e0df78e5382bfa2ee4cdc5fd3499ecea027763aa8ac37db3f6c02df37c0b41bf02312d65bcec47d56dc5429a12cc4e6de6cf298ddf7f2071118d0e745e080900b191c469782e558955d32197cbc6ccc698eabb1c09bfc05d2676734470c52371082e71d47dcfba71457890e4ccf84f092cc727f4690b53e1e8a238ad2d6fa80b42f13b3b8e1ff52e8c257d14ed75130caed60b907570818db1546a5110114e93a513f8a0debf7b83200db81da955acdaa349dfc16c290c59940944b91083c7744d50c6e42a038c0931e68f1f9e326d2b8ffc024ae1bfb98cd2497cab5781f3e99b0ba8e23e819985f1f9985cbf6d7a81d8fc0f1c1804a51d5e5a6df03bbb5879636a5f7463bfdcc3662a5ffc5dab6a67b86c6a72ff034d8c3fcfaca2187a0876eabf9a30db7c9ce3cf1e4e6a126bb6efdf5555ccc4f839d491291d1cda247e3c6d65fd0afa60968f693eeb690388c0b011f83ed9241280d2b2fe3b201ff71ff9ca5bb47d51f6c7ee01e0bee16f2a288bc4824b593c16e77cc7ce7866af72a9c03dd8fbfcb3f001383e2243c942df1592d52fce5dd10573d8ddd53588d42c8dce9ae69e9d92ca564ae0477f4475b0ff6f3598217e90dae9a4789c38c63df88af79fc58baea2c90b5c60c0a0f37b8e41d262c5bb08d4ac8e9aafe9e02e79c03a7db5738510799245f2062e4382a9d45b7c400b1a708c67dc8d2a04cbb7e1205ac0f19d144e3f8374802dbe852753999e8175a04be90fda7fb008cdcdbec5aa93735b4cbbd2f7949cc00987793a486b5559274f343f8e8f0130f79a32618c396251eb0e56ec7ff6a92380a640f4ea8eb849cf7bb4e1567876f252462b0f48ec62b18f9add66f52e4165a078fb6fca0cd122613e063f30dfbacebe3fd43afca0e92acce1e7f84583fc45320a589b22edd0909f5766db6be47112b53c96a1c14befd734a989467c268ec9bc0f7cf15fa0e326b945f2a84d53277cb1639be0199931f78db77c9f4e4b5c3f2d197105ce7cf1b7beb7c9e4b9f6baf3fe996dce53139984d39e014928d9cb0ab01cfedd938cdce943b1040a810b200756708f53a3e867f08038bbf93ff7eb0c9ae212651d8dfafe1ac15e70773bed18997277a5bb1b1ddbe24c8465ec8be3b19687dd5be132c6237f5d87ad82b1117f097632c0cc3c54e054c02162c12814f32a8ff6f1df06cb4b4dfa2a7ee12513f77dfea68ca043081ba42ef018a1233bed1cb24278bab3442b1dfa0ddc6a42aa71254d2b03d9c273cbe20b6ed1abddc389dd0c99e696a390b87012aebcf07f588d7e4f2732bf912a3e069c62513c0273da51a0a59a3a91fc01cf6372ad68fcf931b7e73f9cf87f9abd826dc3549f0541395d70450b1a3214f679d900b8b625c813fda5702078784d2f80bab47dd4bb3ee9164262a0ad78b67ea491fbd24e9cb2a8eff595c2fa115b67cfe25ea6d4e746005ec5b4f514a357ad98a1a74cd419ac6398d3a8505d98759ab39670014972984dd93a65e323fced70a19d4569026b16839b86a6572c2ba08b97047e013fd8a327ad4d08dca517b894fb7f40addaada53f07f647d82229c7bcd8623869f265b541b603160a164ed47dbbf0080ff310e334baea6108234e36af67d9dd05610712a3f89e87737f2f2b9b1b164afd60bd0ebb141f6e262009058bc6d6ff2eb3a992d933cf3411b167dae9b9bb7db8c9b2f4c6207cbffe869d438b9cacda77cbaa6299bab346f999d9920beb88acf43459c40f6931ab41bbf36cd1d861d1463cb27afa2e5630930e4918dc86e786105255ddf425ace423ec8d4ffb183de877f8dd666ea85ce6f563ed3814bdc28a9bf9fc640763eab5de8e469ae5550540e5982048d97d19d976dd5f5034528d7b3a07f47686e74708c8f6cd81b10ea2e67e32dd65d6908a6439e3f904f43cab1f0f0c5fdff9983ca0bcc51d0848cda76870a5b5aa40112a6b55561d27d28e36d2afa5df7e5eb42da8d115241ab6ba4055e49bd6c289bc8846523ae961b60cef775fb682861c2a2b6f43bfc41f806b4c890c1585b0394b0b113d2ceb444375f145e053d79110c7ea5be454b9838f18b9d42eec0590118862f56aa1dac86175aa7944ca761b87e6e5b720cc1d9574075a6a58d1f7d3a11c031841e54cabdce4872ec1b5854ff9494588f03428871f78f948c212d6202fa4cb471ec5e89f1f6e9aeb4174f21f2e55d7f9ef64fe9aba82711729a14b35b177b8f5c000a34d14ce65be071b5044467efd3a41ef1a8ed0ef06fb5fe536ed8cd949e7a631bd4c3652fa75351ae57655cc364d6e5b4f60c4d68b41f3e642603ecf5d21c5502ccaa0ea64e43c8a52294313c98ac8eddbb7eb790e382c223e2d57991a00dcce02a4bc540fa9685fb26a6e0062ef627deb6508ba8ae0a73869aa23692308145b68590affabfa53b9cac4c83f82d33366f4a82cb5be5b485609195713ede4722339274f7f10b9d74fcf3a4afbe97b18b8d88a203b52afda4bed1a14266e59365fe7a8b08a5247db15d0b2f7c07a29485aeac872b3e3a5d26b585e73b88d574a581f1240daf6a20275079c40ac54b9ddbc09642bbc3912b6fbd79bc9d1acd193b906fa86432f755b73755a9ef322faa1b36d7525869fabfac9865a62acbf90488b07f705c875175db5b32b0339cd6dd42381a854644b627e0271542eb2b32bb14b83541e8761274be04a49d419853bb00bfb121fb63b5a7c6cd32b966ced3058284e101a68e438301098c5049e91d3079a5fc3a36f4a7dec45c588fae8749cc36b82dfa1a3d989ed071863425019efdd2163a126b2682ca019540ae5f29ad839509ed72653986e0127c467cd74bcbf09a64defe18fd50555be1248f6d3324ba6022a8e871fb2a2565cc1f9344f95b208fa6f7813fd136e6d50c619fe02d1b75623af3e3e63f9d409ba0c69266e0461bbf3eb9e2afabf159e08151914b3a1cf5ba8747ae9c6257ded2d075f82af98cd9da15e7b01d0ad884743572666921b74efee6f4a69aca5616170097f93b825afc47112176fff01372a23d5e2dfce80dc23ccb29106ff4f9cd770119fba06ac9290bfd64dd68fae8ac897160bc19d1f453c53591fd075744265dca119aa83a73f2f72a71f0f1164441d76fe259e4e763804c4e68626add47f88d1bc1b552135d2e812cc47b63cf5cd703f774722af81df3009fc149b9b9694b6f232971eaf7d63c615087a40348bb4804f452bf0d785898d0c4afa43e1394d650818705959b2a4b99177334911f069eac006f5626757aa1d61537a67cfe7671828159e4970e6051e4acbcbe3eccf422a02c3537d14527694e52b2b1d4bb486556d4260150e2eca88342294b63c760fc9ca471b85f108cf1d855a0f05542878ae27f64ee6e0bb53cfdaa6d20e5d5287dcc9de8d38111f7007d38352f256a103bc31c0269f34785e983d20ee5d3001f688bf0beb7156d8305b97ba6c8105f4fa0e3de1b4fee497b108a9d87e9670216f0bec2713b65a23efba2769bcd77438b1f9d092015f5bbc5a6b966d3afa621052820a25dace185ce71e7b66dadf175431bdba795b60a7db31eb3b2c1bcad6e612f18a2dd9040befc58c042512e3346ccbd5290449ba82ba9d23dccffe598e6f15832a910358ddf686003c7118e712abed61032349557c5724db81127a2cdfec97706c22fb80d4492f65ad11e21f7c4ac069fe6a80d839d35c1cd2d50cbaf2410a3467b639335749d4cca2c2b9b468eedc6c8bb37b6b1ba301c98cfd6e0c18c285d96431e451c89811777f18e54608315c31d92304eb4c82cb63e371be5db17c4f1bc15ae4da30f3d4071cb81ab482bdef23900e9e9b1a1465d1aa12bc4d2e9e4c4d555458470a69779f77f4421b4bd192df056bcadbec09e850dc4ed9bbd8bb62d5dfc371cfd037e0172e37643a3a0ef7c293a9dfe17abafda6f4b94d6a7d922cd8c3c64ae87ffd1785344afc813f194befa2a3c86cab3b1f382323243447788a32d34ea28830bacf520a62f69c3dfdf7e74f45e6349ea0dea8cc842755dcd01c2ce84a55e8d74b973ed795be05c364a389b30341aafe481f346e276226ab30db0faf1a5b686db3606867dd18fde44fb6024cd81f92f5fc036633d61bdba4c2d99c638125e2b2c5b0731d07652de38fdabdff027b6537ddb65c334afcd2054a6b6ef53ca0193dc317b09f1e9efa0237c1ac6e216fe2f8fb7c1839a16e572a8277a96abb948f93d931fb3ba9281065a73c6433a44b39025e39524649f2af7dc3ae5cad8293dbeb5c01cbe42f41305cec679495f652a6482ed02d480c84a43c3087a6de8f1b36b9ab068551514a436f77905aba88b53f8020f5c16da2d17cb29e253816c66a22808af536a1dffaa86d09726ad4d4ae0e349b1655cf455d58bc807ff21d2a040e9175cf5a0fa7634eaa1e8dd69633bafdb41936c25ae35084ebd6662da78c174d8ac3c42369810a968367060413f8d4ee130ad74d385626976d09d2d0935030ed898c0c4fd75cbd3e779233dcbfbce69249e7a141959724351a7b0046d0fa835fbe5733637e255a792cc5b459c98614d9fc99dffa85abc9814b1c7c39529764c73cddc82edaf365c745f6ff036ce616b02295a2bee899a540d2fb80a0a627f603d113d5a86b3b9ffad0d9f5877fb27dd06ea6cff53d928cf2ac9c0838ff8ad0939a2c35ecd562b117622b5427b56d1a254b2f8ca0a80d9e78d1abb4f5bf12dfcf9907c06db5afce1d4e457d2a93d1a2562c78ebc1857b9bd353dfdf422e46a47e4614a2348d237f9757a453139bfd0b8eb98f2cb4035d01d0e0c6e7519ce12c3afacb9e6b0d57748fae37c618d17fe8b288a9fbe7468db5521f1d99d942b6710598d25ce1a02ef2648554f112268994cf8e6824d8d40ea29a1e93bf1c2705a5bdedd11678d7439cf7a9be04b34a22957197cd8b918ad04bf5ba07d5637424fe828d5cf247c79ea9bdc0f12ec911623a6ab33033fc04f6cf0a9a1f83529492d8c975e318cfb65dc798c0ada97fa3219d2dd1877"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005e240)={0xa62a, [], 0x7, "ab208035038e64"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "2156816c73038c"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {0x0, r5}], 0x80, "ae0c2fe64f48d1"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005f240)={0x1, [], 0x5, "b0c978929f24e2"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x0, "2156816c73038c"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}], 0x80, "ae0c2fe64f48d1"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000060240)={{0x0, 0x401, 0x4, 0x7, 0x6770332b, 0x7f, 0xb2b5, 0x10000, 0x7a, 0x1, 0x3ff, 0xfffffffffffffffd, 0xab, 0x3, 0x100000001}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061240)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r3}, {r4}, {}, {0x0, r6}, {r7}, {r9}], 0x1f, "759717e2178465"}) (async) write(r0, &(0x7f0000000000)="d442754791bb7c2d", 0x8) (async) 17:16:09 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, 0x0, 0x0) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:09 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005d240)={0x0, 0x0, "001f1ff724ebbab0d87803f3ce4412dde0840cd10be55fb0ee029fdcfe16049ca751b5fab6891fa2eb9f77c52e2272c72751652218085c0e59d84e64ca323ee04ac0116d66ce3d5a8eaa6b571acec5252dd2b1be105160b4016db8b9240cfe7d159c51a13fad7361879b5f3500d43f9e8ee242e3448e5da74265a27daa74889e082821349b7fad383eea7e30eb6824724e748c6ff53ae044d96afbaf88dc9ec4bd25d6584919b5a586ad25103ed166df1eb9d60b1eb13c38ac4df9ecc6624cb91455fde8d0f71978a8ede7b9b0a19db218200eadeec1b357e8a00bd12dd30e1d9660b277e4c1effbb9e105314af6f4b4d8cbbcb57da3011a1fe0f8f2dd16c812", "d6e6a9f3ac8a711369d14ca9a527d39a857fe783b592d03c2c9b245fd182db4ba487e1ab95368437a2ce757a917c24678ffc5caa5b18124ac24c4bf96f5e44c39a18095b1a5fac9eccd22957753d3bf59001bcf3f18bb8e37c881f254e5b952962ada1490de20a1f31d85e00c3a28f57c2b0e204f354ac51231ded16cd240072c97aeb27dbe1aee886a31f0727b1e96a8099f6a22081089e3991e3ea09648794c0a05fe8cc98856600ed7aa295ae39412d22f8460ed467fb4183f137b7fdb00603ab9535de328fc3cd1899b76bfd33557a35ed94ce818f3845f68849599727d57b98da642eb40b05474a54db3949403cb24131227069b0b3f0196b331b0e9bc1527e7ddb483db831e4ef44b7e165bc2ecec13efd8e9e0df78e5382bfa2ee4cdc5fd3499ecea027763aa8ac37db3f6c02df37c0b41bf02312d65bcec47d56dc5429a12cc4e6de6cf298ddf7f2071118d0e745e080900b191c469782e558955d32197cbc6ccc698eabb1c09bfc05d2676734470c52371082e71d47dcfba71457890e4ccf84f092cc727f4690b53e1e8a238ad2d6fa80b42f13b3b8e1ff52e8c257d14ed75130caed60b907570818db1546a5110114e93a513f8a0debf7b83200db81da955acdaa349dfc16c290c59940944b91083c7744d50c6e42a038c0931e68f1f9e326d2b8ffc024ae1bfb98cd2497cab5781f3e99b0ba8e23e819985f1f9985cbf6d7a81d8fc0f1c1804a51d5e5a6df03bbb5879636a5f7463bfdcc3662a5ffc5dab6a67b86c6a72ff034d8c3fcfaca2187a0876eabf9a30db7c9ce3cf1e4e6a126bb6efdf5555ccc4f839d491291d1cda247e3c6d65fd0afa60968f693eeb690388c0b011f83ed9241280d2b2fe3b201ff71ff9ca5bb47d51f6c7ee01e0bee16f2a288bc4824b593c16e77cc7ce7866af72a9c03dd8fbfcb3f001383e2243c942df1592d52fce5dd10573d8ddd53588d42c8dce9ae69e9d92ca564ae0477f4475b0ff6f3598217e90dae9a4789c38c63df88af79fc58baea2c90b5c60c0a0f37b8e41d262c5bb08d4ac8e9aafe9e02e79c03a7db5738510799245f2062e4382a9d45b7c400b1a708c67dc8d2a04cbb7e1205ac0f19d144e3f8374802dbe852753999e8175a04be90fda7fb008cdcdbec5aa93735b4cbbd2f7949cc00987793a486b5559274f343f8e8f0130f79a32618c396251eb0e56ec7ff6a92380a640f4ea8eb849cf7bb4e1567876f252462b0f48ec62b18f9add66f52e4165a078fb6fca0cd122613e063f30dfbacebe3fd43afca0e92acce1e7f84583fc45320a589b22edd0909f5766db6be47112b53c96a1c14befd734a989467c268ec9bc0f7cf15fa0e326b945f2a84d53277cb1639be0199931f78db77c9f4e4b5c3f2d197105ce7cf1b7beb7c9e4b9f6baf3fe996dce53139984d39e014928d9cb0ab01cfedd938cdce943b1040a810b200756708f53a3e867f08038bbf93ff7eb0c9ae212651d8dfafe1ac15e70773bed18997277a5bb1b1ddbe24c8465ec8be3b19687dd5be132c6237f5d87ad82b1117f097632c0cc3c54e054c02162c12814f32a8ff6f1df06cb4b4dfa2a7ee12513f77dfea68ca043081ba42ef018a1233bed1cb24278bab3442b1dfa0ddc6a42aa71254d2b03d9c273cbe20b6ed1abddc389dd0c99e696a390b87012aebcf07f588d7e4f2732bf912a3e069c62513c0273da51a0a59a3a91fc01cf6372ad68fcf931b7e73f9cf87f9abd826dc3549f0541395d70450b1a3214f679d900b8b625c813fda5702078784d2f80bab47dd4bb3ee9164262a0ad78b67ea491fbd24e9cb2a8eff595c2fa115b67cfe25ea6d4e746005ec5b4f514a357ad98a1a74cd419ac6398d3a8505d98759ab39670014972984dd93a65e323fced70a19d4569026b16839b86a6572c2ba08b97047e013fd8a327ad4d08dca517b894fb7f40addaada53f07f647d82229c7bcd8623869f265b541b603160a164ed47dbbf0080ff310e334baea6108234e36af67d9dd05610712a3f89e87737f2f2b9b1b164afd60bd0ebb141f6e262009058bc6d6ff2eb3a992d933cf3411b167dae9b9bb7db8c9b2f4c6207cbffe869d438b9cacda77cbaa6299bab346f999d9920beb88acf43459c40f6931ab41bbf36cd1d861d1463cb27afa2e5630930e4918dc86e786105255ddf425ace423ec8d4ffb183de877f8dd666ea85ce6f563ed3814bdc28a9bf9fc640763eab5de8e469ae5550540e5982048d97d19d976dd5f5034528d7b3a07f47686e74708c8f6cd81b10ea2e67e32dd65d6908a6439e3f904f43cab1f0f0c5fdff9983ca0bcc51d0848cda76870a5b5aa40112a6b55561d27d28e36d2afa5df7e5eb42da8d115241ab6ba4055e49bd6c289bc8846523ae961b60cef775fb682861c2a2b6f43bfc41f806b4c890c1585b0394b0b113d2ceb444375f145e053d79110c7ea5be454b9838f18b9d42eec0590118862f56aa1dac86175aa7944ca761b87e6e5b720cc1d9574075a6a58d1f7d3a11c031841e54cabdce4872ec1b5854ff9494588f03428871f78f948c212d6202fa4cb471ec5e89f1f6e9aeb4174f21f2e55d7f9ef64fe9aba82711729a14b35b177b8f5c000a34d14ce65be071b5044467efd3a41ef1a8ed0ef06fb5fe536ed8cd949e7a631bd4c3652fa75351ae57655cc364d6e5b4f60c4d68b41f3e642603ecf5d21c5502ccaa0ea64e43c8a52294313c98ac8eddbb7eb790e382c223e2d57991a00dcce02a4bc540fa9685fb26a6e0062ef627deb6508ba8ae0a73869aa23692308145b68590affabfa53b9cac4c83f82d33366f4a82cb5be5b485609195713ede4722339274f7f10b9d74fcf3a4afbe97b18b8d88a203b52afda4bed1a14266e59365fe7a8b08a5247db15d0b2f7c07a29485aeac872b3e3a5d26b585e73b88d574a581f1240daf6a20275079c40ac54b9ddbc09642bbc3912b6fbd79bc9d1acd193b906fa86432f755b73755a9ef322faa1b36d7525869fabfac9865a62acbf90488b07f705c875175db5b32b0339cd6dd42381a854644b627e0271542eb2b32bb14b83541e8761274be04a49d419853bb00bfb121fb63b5a7c6cd32b966ced3058284e101a68e438301098c5049e91d3079a5fc3a36f4a7dec45c588fae8749cc36b82dfa1a3d989ed071863425019efdd2163a126b2682ca019540ae5f29ad839509ed72653986e0127c467cd74bcbf09a64defe18fd50555be1248f6d3324ba6022a8e871fb2a2565cc1f9344f95b208fa6f7813fd136e6d50c619fe02d1b75623af3e3e63f9d409ba0c69266e0461bbf3eb9e2afabf159e08151914b3a1cf5ba8747ae9c6257ded2d075f82af98cd9da15e7b01d0ad884743572666921b74efee6f4a69aca5616170097f93b825afc47112176fff01372a23d5e2dfce80dc23ccb29106ff4f9cd770119fba06ac9290bfd64dd68fae8ac897160bc19d1f453c53591fd075744265dca119aa83a73f2f72a71f0f1164441d76fe259e4e763804c4e68626add47f88d1bc1b552135d2e812cc47b63cf5cd703f774722af81df3009fc149b9b9694b6f232971eaf7d63c615087a40348bb4804f452bf0d785898d0c4afa43e1394d650818705959b2a4b99177334911f069eac006f5626757aa1d61537a67cfe7671828159e4970e6051e4acbcbe3eccf422a02c3537d14527694e52b2b1d4bb486556d4260150e2eca88342294b63c760fc9ca471b85f108cf1d855a0f05542878ae27f64ee6e0bb53cfdaa6d20e5d5287dcc9de8d38111f7007d38352f256a103bc31c0269f34785e983d20ee5d3001f688bf0beb7156d8305b97ba6c8105f4fa0e3de1b4fee497b108a9d87e9670216f0bec2713b65a23efba2769bcd77438b1f9d092015f5bbc5a6b966d3afa621052820a25dace185ce71e7b66dadf175431bdba795b60a7db31eb3b2c1bcad6e612f18a2dd9040befc58c042512e3346ccbd5290449ba82ba9d23dccffe598e6f15832a910358ddf686003c7118e712abed61032349557c5724db81127a2cdfec97706c22fb80d4492f65ad11e21f7c4ac069fe6a80d839d35c1cd2d50cbaf2410a3467b639335749d4cca2c2b9b468eedc6c8bb37b6b1ba301c98cfd6e0c18c285d96431e451c89811777f18e54608315c31d92304eb4c82cb63e371be5db17c4f1bc15ae4da30f3d4071cb81ab482bdef23900e9e9b1a1465d1aa12bc4d2e9e4c4d555458470a69779f77f4421b4bd192df056bcadbec09e850dc4ed9bbd8bb62d5dfc371cfd037e0172e37643a3a0ef7c293a9dfe17abafda6f4b94d6a7d922cd8c3c64ae87ffd1785344afc813f194befa2a3c86cab3b1f382323243447788a32d34ea28830bacf520a62f69c3dfdf7e74f45e6349ea0dea8cc842755dcd01c2ce84a55e8d74b973ed795be05c364a389b30341aafe481f346e276226ab30db0faf1a5b686db3606867dd18fde44fb6024cd81f92f5fc036633d61bdba4c2d99c638125e2b2c5b0731d07652de38fdabdff027b6537ddb65c334afcd2054a6b6ef53ca0193dc317b09f1e9efa0237c1ac6e216fe2f8fb7c1839a16e572a8277a96abb948f93d931fb3ba9281065a73c6433a44b39025e39524649f2af7dc3ae5cad8293dbeb5c01cbe42f41305cec679495f652a6482ed02d480c84a43c3087a6de8f1b36b9ab068551514a436f77905aba88b53f8020f5c16da2d17cb29e253816c66a22808af536a1dffaa86d09726ad4d4ae0e349b1655cf455d58bc807ff21d2a040e9175cf5a0fa7634eaa1e8dd69633bafdb41936c25ae35084ebd6662da78c174d8ac3c42369810a968367060413f8d4ee130ad74d385626976d09d2d0935030ed898c0c4fd75cbd3e779233dcbfbce69249e7a141959724351a7b0046d0fa835fbe5733637e255a792cc5b459c98614d9fc99dffa85abc9814b1c7c39529764c73cddc82edaf365c745f6ff036ce616b02295a2bee899a540d2fb80a0a627f603d113d5a86b3b9ffad0d9f5877fb27dd06ea6cff53d928cf2ac9c0838ff8ad0939a2c35ecd562b117622b5427b56d1a254b2f8ca0a80d9e78d1abb4f5bf12dfcf9907c06db5afce1d4e457d2a93d1a2562c78ebc1857b9bd353dfdf422e46a47e4614a2348d237f9757a453139bfd0b8eb98f2cb4035d01d0e0c6e7519ce12c3afacb9e6b0d57748fae37c618d17fe8b288a9fbe7468db5521f1d99d942b6710598d25ce1a02ef2648554f112268994cf8e6824d8d40ea29a1e93bf1c2705a5bdedd11678d7439cf7a9be04b34a22957197cd8b918ad04bf5ba07d5637424fe828d5cf247c79ea9bdc0f12ec911623a6ab33033fc04f6cf0a9a1f83529492d8c975e318cfb65dc798c0ada97fa3219d2dd1877"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005e240)={0xa62a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7, "ab208035038e64"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {0x0, r5}], 0x80, "ae0c2fe64f48d1"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005f240)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "b0c978929f24e2"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}], 0x80, "ae0c2fe64f48d1"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000060240)={{0x0, 0x401, 0x4, 0x7, 0x6770332b, 0x7f, 0xb2b5, 0x10000, 0x7a, 0x1, 0x3ff, 0xfffffffffffffffd, 0xab, 0x3, 0x100000001}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061240)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r3}, {r4}, {}, {0x0, r6}, {r7}, {r9}], 0x1f, "759717e2178465"}) write(r0, &(0x7f0000000000)="d442754791bb7c2d", 0x8) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005d240)={0x0, 0x0, "001f1ff724ebbab0d87803f3ce4412dde0840cd10be55fb0ee029fdcfe16049ca751b5fab6891fa2eb9f77c52e2272c72751652218085c0e59d84e64ca323ee04ac0116d66ce3d5a8eaa6b571acec5252dd2b1be105160b4016db8b9240cfe7d159c51a13fad7361879b5f3500d43f9e8ee242e3448e5da74265a27daa74889e082821349b7fad383eea7e30eb6824724e748c6ff53ae044d96afbaf88dc9ec4bd25d6584919b5a586ad25103ed166df1eb9d60b1eb13c38ac4df9ecc6624cb91455fde8d0f71978a8ede7b9b0a19db218200eadeec1b357e8a00bd12dd30e1d9660b277e4c1effbb9e105314af6f4b4d8cbbcb57da3011a1fe0f8f2dd16c812", "d6e6a9f3ac8a711369d14ca9a527d39a857fe783b592d03c2c9b245fd182db4ba487e1ab95368437a2ce757a917c24678ffc5caa5b18124ac24c4bf96f5e44c39a18095b1a5fac9eccd22957753d3bf59001bcf3f18bb8e37c881f254e5b952962ada1490de20a1f31d85e00c3a28f57c2b0e204f354ac51231ded16cd240072c97aeb27dbe1aee886a31f0727b1e96a8099f6a22081089e3991e3ea09648794c0a05fe8cc98856600ed7aa295ae39412d22f8460ed467fb4183f137b7fdb00603ab9535de328fc3cd1899b76bfd33557a35ed94ce818f3845f68849599727d57b98da642eb40b05474a54db3949403cb24131227069b0b3f0196b331b0e9bc1527e7ddb483db831e4ef44b7e165bc2ecec13efd8e9e0df78e5382bfa2ee4cdc5fd3499ecea027763aa8ac37db3f6c02df37c0b41bf02312d65bcec47d56dc5429a12cc4e6de6cf298ddf7f2071118d0e745e080900b191c469782e558955d32197cbc6ccc698eabb1c09bfc05d2676734470c52371082e71d47dcfba71457890e4ccf84f092cc727f4690b53e1e8a238ad2d6fa80b42f13b3b8e1ff52e8c257d14ed75130caed60b907570818db1546a5110114e93a513f8a0debf7b83200db81da955acdaa349dfc16c290c59940944b91083c7744d50c6e42a038c0931e68f1f9e326d2b8ffc024ae1bfb98cd2497cab5781f3e99b0ba8e23e819985f1f9985cbf6d7a81d8fc0f1c1804a51d5e5a6df03bbb5879636a5f7463bfdcc3662a5ffc5dab6a67b86c6a72ff034d8c3fcfaca2187a0876eabf9a30db7c9ce3cf1e4e6a126bb6efdf5555ccc4f839d491291d1cda247e3c6d65fd0afa60968f693eeb690388c0b011f83ed9241280d2b2fe3b201ff71ff9ca5bb47d51f6c7ee01e0bee16f2a288bc4824b593c16e77cc7ce7866af72a9c03dd8fbfcb3f001383e2243c942df1592d52fce5dd10573d8ddd53588d42c8dce9ae69e9d92ca564ae0477f4475b0ff6f3598217e90dae9a4789c38c63df88af79fc58baea2c90b5c60c0a0f37b8e41d262c5bb08d4ac8e9aafe9e02e79c03a7db5738510799245f2062e4382a9d45b7c400b1a708c67dc8d2a04cbb7e1205ac0f19d144e3f8374802dbe852753999e8175a04be90fda7fb008cdcdbec5aa93735b4cbbd2f7949cc00987793a486b5559274f343f8e8f0130f79a32618c396251eb0e56ec7ff6a92380a640f4ea8eb849cf7bb4e1567876f252462b0f48ec62b18f9add66f52e4165a078fb6fca0cd122613e063f30dfbacebe3fd43afca0e92acce1e7f84583fc45320a589b22edd0909f5766db6be47112b53c96a1c14befd734a989467c268ec9bc0f7cf15fa0e326b945f2a84d53277cb1639be0199931f78db77c9f4e4b5c3f2d197105ce7cf1b7beb7c9e4b9f6baf3fe996dce53139984d39e014928d9cb0ab01cfedd938cdce943b1040a810b200756708f53a3e867f08038bbf93ff7eb0c9ae212651d8dfafe1ac15e70773bed18997277a5bb1b1ddbe24c8465ec8be3b19687dd5be132c6237f5d87ad82b1117f097632c0cc3c54e054c02162c12814f32a8ff6f1df06cb4b4dfa2a7ee12513f77dfea68ca043081ba42ef018a1233bed1cb24278bab3442b1dfa0ddc6a42aa71254d2b03d9c273cbe20b6ed1abddc389dd0c99e696a390b87012aebcf07f588d7e4f2732bf912a3e069c62513c0273da51a0a59a3a91fc01cf6372ad68fcf931b7e73f9cf87f9abd826dc3549f0541395d70450b1a3214f679d900b8b625c813fda5702078784d2f80bab47dd4bb3ee9164262a0ad78b67ea491fbd24e9cb2a8eff595c2fa115b67cfe25ea6d4e746005ec5b4f514a357ad98a1a74cd419ac6398d3a8505d98759ab39670014972984dd93a65e323fced70a19d4569026b16839b86a6572c2ba08b97047e013fd8a327ad4d08dca517b894fb7f40addaada53f07f647d82229c7bcd8623869f265b541b603160a164ed47dbbf0080ff310e334baea6108234e36af67d9dd05610712a3f89e87737f2f2b9b1b164afd60bd0ebb141f6e262009058bc6d6ff2eb3a992d933cf3411b167dae9b9bb7db8c9b2f4c6207cbffe869d438b9cacda77cbaa6299bab346f999d9920beb88acf43459c40f6931ab41bbf36cd1d861d1463cb27afa2e5630930e4918dc86e786105255ddf425ace423ec8d4ffb183de877f8dd666ea85ce6f563ed3814bdc28a9bf9fc640763eab5de8e469ae5550540e5982048d97d19d976dd5f5034528d7b3a07f47686e74708c8f6cd81b10ea2e67e32dd65d6908a6439e3f904f43cab1f0f0c5fdff9983ca0bcc51d0848cda76870a5b5aa40112a6b55561d27d28e36d2afa5df7e5eb42da8d115241ab6ba4055e49bd6c289bc8846523ae961b60cef775fb682861c2a2b6f43bfc41f806b4c890c1585b0394b0b113d2ceb444375f145e053d79110c7ea5be454b9838f18b9d42eec0590118862f56aa1dac86175aa7944ca761b87e6e5b720cc1d9574075a6a58d1f7d3a11c031841e54cabdce4872ec1b5854ff9494588f03428871f78f948c212d6202fa4cb471ec5e89f1f6e9aeb4174f21f2e55d7f9ef64fe9aba82711729a14b35b177b8f5c000a34d14ce65be071b5044467efd3a41ef1a8ed0ef06fb5fe536ed8cd949e7a631bd4c3652fa75351ae57655cc364d6e5b4f60c4d68b41f3e642603ecf5d21c5502ccaa0ea64e43c8a52294313c98ac8eddbb7eb790e382c223e2d57991a00dcce02a4bc540fa9685fb26a6e0062ef627deb6508ba8ae0a73869aa23692308145b68590affabfa53b9cac4c83f82d33366f4a82cb5be5b485609195713ede4722339274f7f10b9d74fcf3a4afbe97b18b8d88a203b52afda4bed1a14266e59365fe7a8b08a5247db15d0b2f7c07a29485aeac872b3e3a5d26b585e73b88d574a581f1240daf6a20275079c40ac54b9ddbc09642bbc3912b6fbd79bc9d1acd193b906fa86432f755b73755a9ef322faa1b36d7525869fabfac9865a62acbf90488b07f705c875175db5b32b0339cd6dd42381a854644b627e0271542eb2b32bb14b83541e8761274be04a49d419853bb00bfb121fb63b5a7c6cd32b966ced3058284e101a68e438301098c5049e91d3079a5fc3a36f4a7dec45c588fae8749cc36b82dfa1a3d989ed071863425019efdd2163a126b2682ca019540ae5f29ad839509ed72653986e0127c467cd74bcbf09a64defe18fd50555be1248f6d3324ba6022a8e871fb2a2565cc1f9344f95b208fa6f7813fd136e6d50c619fe02d1b75623af3e3e63f9d409ba0c69266e0461bbf3eb9e2afabf159e08151914b3a1cf5ba8747ae9c6257ded2d075f82af98cd9da15e7b01d0ad884743572666921b74efee6f4a69aca5616170097f93b825afc47112176fff01372a23d5e2dfce80dc23ccb29106ff4f9cd770119fba06ac9290bfd64dd68fae8ac897160bc19d1f453c53591fd075744265dca119aa83a73f2f72a71f0f1164441d76fe259e4e763804c4e68626add47f88d1bc1b552135d2e812cc47b63cf5cd703f774722af81df3009fc149b9b9694b6f232971eaf7d63c615087a40348bb4804f452bf0d785898d0c4afa43e1394d650818705959b2a4b99177334911f069eac006f5626757aa1d61537a67cfe7671828159e4970e6051e4acbcbe3eccf422a02c3537d14527694e52b2b1d4bb486556d4260150e2eca88342294b63c760fc9ca471b85f108cf1d855a0f05542878ae27f64ee6e0bb53cfdaa6d20e5d5287dcc9de8d38111f7007d38352f256a103bc31c0269f34785e983d20ee5d3001f688bf0beb7156d8305b97ba6c8105f4fa0e3de1b4fee497b108a9d87e9670216f0bec2713b65a23efba2769bcd77438b1f9d092015f5bbc5a6b966d3afa621052820a25dace185ce71e7b66dadf175431bdba795b60a7db31eb3b2c1bcad6e612f18a2dd9040befc58c042512e3346ccbd5290449ba82ba9d23dccffe598e6f15832a910358ddf686003c7118e712abed61032349557c5724db81127a2cdfec97706c22fb80d4492f65ad11e21f7c4ac069fe6a80d839d35c1cd2d50cbaf2410a3467b639335749d4cca2c2b9b468eedc6c8bb37b6b1ba301c98cfd6e0c18c285d96431e451c89811777f18e54608315c31d92304eb4c82cb63e371be5db17c4f1bc15ae4da30f3d4071cb81ab482bdef23900e9e9b1a1465d1aa12bc4d2e9e4c4d555458470a69779f77f4421b4bd192df056bcadbec09e850dc4ed9bbd8bb62d5dfc371cfd037e0172e37643a3a0ef7c293a9dfe17abafda6f4b94d6a7d922cd8c3c64ae87ffd1785344afc813f194befa2a3c86cab3b1f382323243447788a32d34ea28830bacf520a62f69c3dfdf7e74f45e6349ea0dea8cc842755dcd01c2ce84a55e8d74b973ed795be05c364a389b30341aafe481f346e276226ab30db0faf1a5b686db3606867dd18fde44fb6024cd81f92f5fc036633d61bdba4c2d99c638125e2b2c5b0731d07652de38fdabdff027b6537ddb65c334afcd2054a6b6ef53ca0193dc317b09f1e9efa0237c1ac6e216fe2f8fb7c1839a16e572a8277a96abb948f93d931fb3ba9281065a73c6433a44b39025e39524649f2af7dc3ae5cad8293dbeb5c01cbe42f41305cec679495f652a6482ed02d480c84a43c3087a6de8f1b36b9ab068551514a436f77905aba88b53f8020f5c16da2d17cb29e253816c66a22808af536a1dffaa86d09726ad4d4ae0e349b1655cf455d58bc807ff21d2a040e9175cf5a0fa7634eaa1e8dd69633bafdb41936c25ae35084ebd6662da78c174d8ac3c42369810a968367060413f8d4ee130ad74d385626976d09d2d0935030ed898c0c4fd75cbd3e779233dcbfbce69249e7a141959724351a7b0046d0fa835fbe5733637e255a792cc5b459c98614d9fc99dffa85abc9814b1c7c39529764c73cddc82edaf365c745f6ff036ce616b02295a2bee899a540d2fb80a0a627f603d113d5a86b3b9ffad0d9f5877fb27dd06ea6cff53d928cf2ac9c0838ff8ad0939a2c35ecd562b117622b5427b56d1a254b2f8ca0a80d9e78d1abb4f5bf12dfcf9907c06db5afce1d4e457d2a93d1a2562c78ebc1857b9bd353dfdf422e46a47e4614a2348d237f9757a453139bfd0b8eb98f2cb4035d01d0e0c6e7519ce12c3afacb9e6b0d57748fae37c618d17fe8b288a9fbe7468db5521f1d99d942b6710598d25ce1a02ef2648554f112268994cf8e6824d8d40ea29a1e93bf1c2705a5bdedd11678d7439cf7a9be04b34a22957197cd8b918ad04bf5ba07d5637424fe828d5cf247c79ea9bdc0f12ec911623a6ab33033fc04f6cf0a9a1f83529492d8c975e318cfb65dc798c0ada97fa3219d2dd1877"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005e240)={0xa62a, [], 0x7, "ab208035038e64"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "2156816c73038c"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {0x0, r5}], 0x80, "ae0c2fe64f48d1"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005f240)={0x1, [], 0x5, "b0c978929f24e2"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x0, "2156816c73038c"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f600)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}], 0x80, "ae0c2fe64f48d1"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000060240)={{0x0, 0x401, 0x4, 0x7, 0x6770332b, 0x7f, 0xb2b5, 0x10000, 0x7a, 0x1, 0x3ff, 0xfffffffffffffffd, 0xab, 0x3, 0x100000001}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061240)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r3}, {r4}, {}, {0x0, r6}, {r7}, {r9}], 0x1f, "759717e2178465"}) (async) write(r0, &(0x7f0000000000)="d442754791bb7c2d", 0x8) (async) 17:16:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:09 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x89, 0x55, 0x5, 0x3f, 0x0, 0x8, 0x40000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x100000001, 0x1}, 0x1000, 0xff, 0x9, 0x1, 0x80, 0xfff, 0x7ff, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x2) clone(0x8000, &(0x7f0000000000)="6024cc5d2338cc3016eb79879cf0715547c764bd435067d5fce5304970a3d6331fa7cb421a4aeadbc4d0b5ca99831b5368624c63590019ba415dc1871ec5062ef74ac1acd7436c695fdc9493fdf02ceebf8a9627616dbf41339ddc73868dd810eacd1f7c38e2ec486f9c6451c787a1370425755bbb9d3eda28692757cf08486cef69e96a4a6faea55104b66771d07703c6491a8b86f9bccbc0132783997d34c777d29c1aaa3913e8f06834a04fef7c57b245adbdc74e432e706022a0bd811a688f2cfea34e1197020b", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="1720e977c3f41a105f19f49931d2f7aaab1bd341a05cab4b655464daf4d6f0d1384f09d22440e8a96d34edb6707919ad4733e5655a92e3e231472561bfe1167ac874a40e1a64e1b81eceeb318383a5ff9790f4ed0b0e67cd24bd4b3c5f4be5ab79610f6cddf09ac4fe3efd7d5d7a1d9a72a4ff5e6b23f0be36b97f84db2a221c2b9d9b27") [ 181.911707][T28212] loop4: detected capacity change from 0 to 262160 [ 181.937065][T28212] FAT-fs (loop4): bogus number of reserved sectors [ 181.943636][T28212] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:10 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x89, 0x55, 0x5, 0x3f, 0x0, 0x8, 0x40000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x100000001, 0x1}, 0x1000, 0xff, 0x9, 0x1, 0x80, 0xfff, 0x7ff, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x2) (async) clone(0x8000, &(0x7f0000000000)="6024cc5d2338cc3016eb79879cf0715547c764bd435067d5fce5304970a3d6331fa7cb421a4aeadbc4d0b5ca99831b5368624c63590019ba415dc1871ec5062ef74ac1acd7436c695fdc9493fdf02ceebf8a9627616dbf41339ddc73868dd810eacd1f7c38e2ec486f9c6451c787a1370425755bbb9d3eda28692757cf08486cef69e96a4a6faea55104b66771d07703c6491a8b86f9bccbc0132783997d34c777d29c1aaa3913e8f06834a04fef7c57b245adbdc74e432e706022a0bd811a688f2cfea34e1197020b", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="1720e977c3f41a105f19f49931d2f7aaab1bd341a05cab4b655464daf4d6f0d1384f09d22440e8a96d34edb6707919ad4733e5655a92e3e231472561bfe1167ac874a40e1a64e1b81eceeb318383a5ff9790f4ed0b0e67cd24bd4b3c5f4be5ab79610f6cddf09ac4fe3efd7d5d7a1d9a72a4ff5e6b23f0be36b97f84db2a221c2b9d9b27") 17:16:10 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async, rerun: 64) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x89, 0x55, 0x5, 0x3f, 0x0, 0x8, 0x40000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x100000001, 0x1}, 0x1000, 0xff, 0x9, 0x1, 0x80, 0xfff, 0x7ff, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x2) (async, rerun: 64) clone(0x8000, &(0x7f0000000000)="6024cc5d2338cc3016eb79879cf0715547c764bd435067d5fce5304970a3d6331fa7cb421a4aeadbc4d0b5ca99831b5368624c63590019ba415dc1871ec5062ef74ac1acd7436c695fdc9493fdf02ceebf8a9627616dbf41339ddc73868dd810eacd1f7c38e2ec486f9c6451c787a1370425755bbb9d3eda28692757cf08486cef69e96a4a6faea55104b66771d07703c6491a8b86f9bccbc0132783997d34c777d29c1aaa3913e8f06834a04fef7c57b245adbdc74e432e706022a0bd811a688f2cfea34e1197020b", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="1720e977c3f41a105f19f49931d2f7aaab1bd341a05cab4b655464daf4d6f0d1384f09d22440e8a96d34edb6707919ad4733e5655a92e3e231472561bfe1167ac874a40e1a64e1b81eceeb318383a5ff9790f4ed0b0e67cd24bd4b3c5f4be5ab79610f6cddf09ac4fe3efd7d5d7a1d9a72a4ff5e6b23f0be36b97f84db2a221c2b9d9b27") (rerun: 64) 17:16:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:10 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) 17:16:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 182.371656][T28581] loop4: detected capacity change from 0 to 262160 [ 182.379741][T28581] FAT-fs (loop4): bogus number of reserved sectors [ 182.386373][T28581] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:10 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x70bd26, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:10 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async, rerun: 32) fallocate(r0, 0x18, 0x101, 0x6) (async, rerun: 32) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) 17:16:10 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, 0x0, 0x0) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:10 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) 17:16:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:10 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:10 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000380)={{r0}, 0x0, 0x4, @unused=[0x76ca, 0x2, 0x6], @subvolid=0x7800}) fallocate(r1, 0x18, 0x101, 0x6) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r6 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r9 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001380)={0x868, r3, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_FEATURES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x44c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xbf, 0x4, "fa69befd0240dd1745972a065e4fee486accc25c4ad6dbcb44b57dc3d09643fdbb01ed5c532c1ef504124c6d2af2e8fccadcbb94f5d5b3157e1cdcf001e7dd14b6d547b454f5da3401df84b71f059bdfe74fa0e9231be0240998d9cd9c5f23a385954c11451919efe06ffe182a3b14aae9f69b3f815a0c37acf27e50507d05fbc346c80686cdfd2cfb72dd95e1c2790f772eabf4dd6e903abb4e5e041a405bfe1a30411fde8e4149093f84aa27e4982a800641af2c2c08398dfd29"}, @ETHTOOL_A_BITSET_BITS={0x94, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb9}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/-\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf36a}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x65f}]}]}, @ETHTOOL_A_BITSET_VALUE={0xb5, 0x4, "c25f9699a9440271f15acb36e378f106dbf7b4cdc8da14484a3aca3aa5b9d417239c8f6310c2f751d50023841239edfd8346c01284c1cacadbe437ef5c423236cdb4fefe9457b1c26acf764b96d2311cccc466d43e2dd3ff8a149bd63f662392835c7b92951c81297f31443ad696a5667cf78f8acc1513455f7cf7c2379f832eff8b681382f58051b12c01611fd67b6d75761c6d19e0315f13dc6579efd45106fc343f6bb0edf4dc9cda64ac1b6699c512"}, @ETHTOOL_A_BITSET_BITS={0x34, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '*\x06+[+\x16{(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '!%-,\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2f}, @ETHTOOL_A_BITSET_MASK={0x63, 0x5, "040d1fec527e967420bd05e6307f4b6295cef6dcdf92e27eb05bfc9f2fa56fa79859ce42a22b42f811973bf81c04a91bd2c6ca20a5e4b5095616db20fd51df3db2304ff8f012a97d4e4c02ec29838242c4b06c1d416bcf01739b0511e19802"}, @ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x4}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '.\xf1..\xb9\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '--\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x14c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8b2}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_VALUE={0xed, 0x4, "d3217df19d538f3c496ca32e2e86c3399cf6fae34dfe2c9a83590142162957a078ae334ead6bf8bf4f551f5bf41b718f149b642e4a1991a30a9a12c9a5b9aefaeef44242847e9c60787e6a2f533270f7ec39ea2eb3185c6c8a436c5513a73446a43552338596bef4bfcfb846ae0e61e264280e7768f426d74c6e6f9142407d87b3cd88f63f465d0576bb2eea30213e40e20b28c83099184a468bcee0285b88ef105fc502698c4137ee0da52d6ec7a3aceacf81a73cc753bbfbaa32a17c36bfaa34abccb12b2cbbd7ab37ae6c2124e359edbea6dc49da147a81f6ba32e811c2176e0469148d6d9c5e43"}, @ETHTOOL_A_BITSET_VALUE={0x47, 0x4, "c469679e79bbd26cfad3fae8d10f2277d81e433225a7e98d6db32ff0adf6227edf5d6db4b5990599e0f488ac531621777bf3c1b8f8b9609f76f219601d0a16407027f2"}]}, @ETHTOOL_A_FEATURES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x234, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x70, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x129c}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '#@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xa0, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\x1e\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff546d}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x11c, 0x3, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(&\xd6\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(.&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff9}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6aef5ad2}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\'(\x9f!]%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xcb3}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x868}, 0x1, 0x0, 0x0, 0x4000080}, 0x400) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 182.671612][T28814] loop4: detected capacity change from 0 to 262160 [ 182.701623][T28814] FAT-fs (loop4): bogus number of reserved sectors [ 182.708215][T28814] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:10 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000380)={{r0}, 0x0, 0x4, @unused=[0x76ca, 0x2, 0x6], @subvolid=0x7800}) (async) fallocate(r1, 0x18, 0x101, 0x6) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) (async) r6 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) (async) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) (async) r9 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001380)={0x868, r3, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_FEATURES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x44c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xbf, 0x4, "fa69befd0240dd1745972a065e4fee486accc25c4ad6dbcb44b57dc3d09643fdbb01ed5c532c1ef504124c6d2af2e8fccadcbb94f5d5b3157e1cdcf001e7dd14b6d547b454f5da3401df84b71f059bdfe74fa0e9231be0240998d9cd9c5f23a385954c11451919efe06ffe182a3b14aae9f69b3f815a0c37acf27e50507d05fbc346c80686cdfd2cfb72dd95e1c2790f772eabf4dd6e903abb4e5e041a405bfe1a30411fde8e4149093f84aa27e4982a800641af2c2c08398dfd29"}, @ETHTOOL_A_BITSET_BITS={0x94, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb9}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/-\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf36a}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x65f}]}]}, @ETHTOOL_A_BITSET_VALUE={0xb5, 0x4, "c25f9699a9440271f15acb36e378f106dbf7b4cdc8da14484a3aca3aa5b9d417239c8f6310c2f751d50023841239edfd8346c01284c1cacadbe437ef5c423236cdb4fefe9457b1c26acf764b96d2311cccc466d43e2dd3ff8a149bd63f662392835c7b92951c81297f31443ad696a5667cf78f8acc1513455f7cf7c2379f832eff8b681382f58051b12c01611fd67b6d75761c6d19e0315f13dc6579efd45106fc343f6bb0edf4dc9cda64ac1b6699c512"}, @ETHTOOL_A_BITSET_BITS={0x34, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '*\x06+[+\x16{(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '!%-,\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2f}, @ETHTOOL_A_BITSET_MASK={0x63, 0x5, "040d1fec527e967420bd05e6307f4b6295cef6dcdf92e27eb05bfc9f2fa56fa79859ce42a22b42f811973bf81c04a91bd2c6ca20a5e4b5095616db20fd51df3db2304ff8f012a97d4e4c02ec29838242c4b06c1d416bcf01739b0511e19802"}, @ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x4}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '.\xf1..\xb9\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '--\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x14c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8b2}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_VALUE={0xed, 0x4, "d3217df19d538f3c496ca32e2e86c3399cf6fae34dfe2c9a83590142162957a078ae334ead6bf8bf4f551f5bf41b718f149b642e4a1991a30a9a12c9a5b9aefaeef44242847e9c60787e6a2f533270f7ec39ea2eb3185c6c8a436c5513a73446a43552338596bef4bfcfb846ae0e61e264280e7768f426d74c6e6f9142407d87b3cd88f63f465d0576bb2eea30213e40e20b28c83099184a468bcee0285b88ef105fc502698c4137ee0da52d6ec7a3aceacf81a73cc753bbfbaa32a17c36bfaa34abccb12b2cbbd7ab37ae6c2124e359edbea6dc49da147a81f6ba32e811c2176e0469148d6d9c5e43"}, @ETHTOOL_A_BITSET_VALUE={0x47, 0x4, "c469679e79bbd26cfad3fae8d10f2277d81e433225a7e98d6db32ff0adf6227edf5d6db4b5990599e0f488ac531621777bf3c1b8f8b9609f76f219601d0a16407027f2"}]}, @ETHTOOL_A_FEATURES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x234, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x70, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x129c}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '#@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xa0, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\x1e\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff546d}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x11c, 0x3, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(&\xd6\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(.&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff9}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6aef5ad2}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\'(\x9f!]%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xcb3}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x868}, 0x1, 0x0, 0x0, 0x4000080}, 0x400) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:10 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000380)={{r0}, 0x0, 0x4, @unused=[0x76ca, 0x2, 0x6], @subvolid=0x7800}) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) (async) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) (async) r6 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r9 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001380)={0x868, r3, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_FEATURES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x44c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xbf, 0x4, "fa69befd0240dd1745972a065e4fee486accc25c4ad6dbcb44b57dc3d09643fdbb01ed5c532c1ef504124c6d2af2e8fccadcbb94f5d5b3157e1cdcf001e7dd14b6d547b454f5da3401df84b71f059bdfe74fa0e9231be0240998d9cd9c5f23a385954c11451919efe06ffe182a3b14aae9f69b3f815a0c37acf27e50507d05fbc346c80686cdfd2cfb72dd95e1c2790f772eabf4dd6e903abb4e5e041a405bfe1a30411fde8e4149093f84aa27e4982a800641af2c2c08398dfd29"}, @ETHTOOL_A_BITSET_BITS={0x94, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb9}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/-\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf36a}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x65f}]}]}, @ETHTOOL_A_BITSET_VALUE={0xb5, 0x4, "c25f9699a9440271f15acb36e378f106dbf7b4cdc8da14484a3aca3aa5b9d417239c8f6310c2f751d50023841239edfd8346c01284c1cacadbe437ef5c423236cdb4fefe9457b1c26acf764b96d2311cccc466d43e2dd3ff8a149bd63f662392835c7b92951c81297f31443ad696a5667cf78f8acc1513455f7cf7c2379f832eff8b681382f58051b12c01611fd67b6d75761c6d19e0315f13dc6579efd45106fc343f6bb0edf4dc9cda64ac1b6699c512"}, @ETHTOOL_A_BITSET_BITS={0x34, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '*\x06+[+\x16{(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '!%-,\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2f}, @ETHTOOL_A_BITSET_MASK={0x63, 0x5, "040d1fec527e967420bd05e6307f4b6295cef6dcdf92e27eb05bfc9f2fa56fa79859ce42a22b42f811973bf81c04a91bd2c6ca20a5e4b5095616db20fd51df3db2304ff8f012a97d4e4c02ec29838242c4b06c1d416bcf01739b0511e19802"}, @ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x4}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '.\xf1..\xb9\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '--\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x14c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8b2}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_VALUE={0xed, 0x4, "d3217df19d538f3c496ca32e2e86c3399cf6fae34dfe2c9a83590142162957a078ae334ead6bf8bf4f551f5bf41b718f149b642e4a1991a30a9a12c9a5b9aefaeef44242847e9c60787e6a2f533270f7ec39ea2eb3185c6c8a436c5513a73446a43552338596bef4bfcfb846ae0e61e264280e7768f426d74c6e6f9142407d87b3cd88f63f465d0576bb2eea30213e40e20b28c83099184a468bcee0285b88ef105fc502698c4137ee0da52d6ec7a3aceacf81a73cc753bbfbaa32a17c36bfaa34abccb12b2cbbd7ab37ae6c2124e359edbea6dc49da147a81f6ba32e811c2176e0469148d6d9c5e43"}, @ETHTOOL_A_BITSET_VALUE={0x47, 0x4, "c469679e79bbd26cfad3fae8d10f2277d81e433225a7e98d6db32ff0adf6227edf5d6db4b5990599e0f488ac531621777bf3c1b8f8b9609f76f219601d0a16407027f2"}]}, @ETHTOOL_A_FEATURES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x234, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x70, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x129c}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '#@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xa0, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\x1e\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff546d}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x11c, 0x3, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(&\xd6\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(.&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff9}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6aef5ad2}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\'(\x9f!]%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xcb3}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x868}, 0x1, 0x0, 0x0, 0x4000080}, 0x400) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:11 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x10000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) copy_file_range(0xffffffffffffffff, &(0x7f0000000000)=0x7f, 0xffffffffffffffff, &(0x7f0000000040)=0x2, 0xac45, 0x0) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 183.222162][T29214] loop4: detected capacity change from 0 to 262160 [ 183.229676][T29214] FAT-fs (loop4): bogus number of reserved sectors [ 183.236232][T29214] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:11 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x10000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) copy_file_range(0xffffffffffffffff, &(0x7f0000000000)=0x7f, 0xffffffffffffffff, &(0x7f0000000040)=0x2, 0xac45, 0x0) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:11 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x70bd26, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:11 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(0xffffffffffffffff, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:11 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x10000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) copy_file_range(0xffffffffffffffff, &(0x7f0000000000)=0x7f, 0xffffffffffffffff, &(0x7f0000000040)=0x2, 0xac45, 0x0) (async, rerun: 32) fallocate(r0, 0x18, 0x101, 0x6) (rerun: 32) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:11 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:11 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x40, 0x0, 0x6e, 0x0, 0x6ca9, 0x8, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp, 0x88d, 0x100000001, 0x0, 0x1, 0x7d2, 0x9, 0x9, 0x0, 0x8}, 0x0, 0xa, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) syz_io_uring_setup(0x78f7, &(0x7f0000000180)={0x0, 0xbb14, 0x2, 0x1, 0x48}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000200)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, r0, 0x80, &(0x7f0000000240)=@l2={0x1f, 0xe3, @none, 0x3fa5}, 0x0, 0x0, 0x0, {0x0, r2}}, 0x6) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 183.522569][T29432] loop4: detected capacity change from 0 to 262160 [ 183.545599][T29432] FAT-fs (loop4): bogus number of reserved sectors [ 183.552171][T29432] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:11 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x40, 0x0, 0x6e, 0x0, 0x6ca9, 0x8, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp, 0x88d, 0x100000001, 0x0, 0x1, 0x7d2, 0x9, 0x9, 0x0, 0x8}, 0x0, 0xa, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) syz_io_uring_setup(0x78f7, &(0x7f0000000180)={0x0, 0xbb14, 0x2, 0x1, 0x48}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000200)=0x0) (async) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, r0, 0x80, &(0x7f0000000240)=@l2={0x1f, 0xe3, @none, 0x3fa5}, 0x0, 0x0, 0x0, {0x0, r2}}, 0x6) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:11 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x40, 0x0, 0x6e, 0x0, 0x6ca9, 0x8, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp, 0x88d, 0x100000001, 0x0, 0x1, 0x7d2, 0x9, 0x9, 0x0, 0x8}, 0x0, 0xa, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) syz_io_uring_setup(0x78f7, &(0x7f0000000180)={0x0, 0xbb14, 0x2, 0x1, 0x48}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000200)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, r0, 0x80, &(0x7f0000000240)=@l2={0x1f, 0xe3, @none, 0x3fa5}, 0x0, 0x0, 0x0, {0x0, r2}}, 0x6) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x40, 0x0, 0x6e, 0x0, 0x6ca9, 0x8, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp, 0x88d, 0x100000001, 0x0, 0x1, 0x7d2, 0x9, 0x9, 0x0, 0x8}, 0x0, 0xa, 0xffffffffffffffff, 0x1) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) syz_io_uring_setup(0x78f7, &(0x7f0000000180)={0x0, 0xbb14, 0x2, 0x1, 0x48}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) (async) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) (async) syz_io_uring_submit(0x0, r1, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, r0, 0x80, &(0x7f0000000240)=@l2={0x1f, 0xe3, @none, 0x3fa5}, 0x0, 0x0, 0x0, {0x0, r2}}, 0x6) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:12 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000)={'ip6gre0', 0x32, 0x34}, 0xa) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 184.072983][T29848] loop4: detected capacity change from 0 to 262160 [ 184.080535][T29848] FAT-fs (loop4): bogus number of reserved sectors [ 184.087113][T29848] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:12 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000)={'ip6gre0', 0x32, 0x34}, 0xa) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:12 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x70bd26, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:12 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(0xffffffffffffffff, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:12 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000)={'ip6gre0', 0x32, 0x34}, 0xa) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) dup2(0xffffffffffffffff, 0xffffffffffffffff) (async) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000)={'ip6gre0', 0x32, 0x34}, 0xa) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:12 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 184.372634][T30063] loop4: detected capacity change from 0 to 262160 [ 184.396557][T30063] FAT-fs (loop4): bogus number of reserved sectors [ 184.403281][T30063] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:12 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x81, 0xfc, 0xb, 0x0, 0x0, 0x6, 0x204c3, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, r0, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000080)=0x4) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:12 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x81, 0xfc, 0xb, 0x0, 0x0, 0x6, 0x204c3, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, r0, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:12 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x81, 0xfc, 0xb, 0x0, 0x0, 0x6, 0x204c3, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, r0, 0x1) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:12 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x1, 0x0, 0x0, 0x0, 0xb04c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/229, 0xe5}, {&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000380)=""/169, 0xa9}, {&(0x7f0000000300)=""/62, 0x3e}, {&(0x7f0000000440)=""/108, 0x6c}], 0x6, 0x21, 0x401) 17:16:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 184.919900][T30478] loop4: detected capacity change from 0 to 262160 [ 184.928159][T30478] FAT-fs (loop4): bogus number of reserved sectors [ 184.934706][T30478] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:13 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x1, 0x0, 0x0, 0x0, 0xb04c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/229, 0xe5}, {&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000380)=""/169, 0xa9}, {&(0x7f0000000300)=""/62, 0x3e}, {&(0x7f0000000440)=""/108, 0x6c}], 0x6, 0x21, 0x401) (rerun: 32) 17:16:13 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x14, r2, 0x300, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:13 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(0xffffffffffffffff, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:13 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x1, 0x0, 0x0, 0x0, 0xb04c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/229, 0xe5}, {&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000380)=""/169, 0xa9}, {&(0x7f0000000300)=""/62, 0x3e}, {&(0x7f0000000440)=""/108, 0x6c}], 0x6, 0x21, 0x401) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x1, 0x0, 0x0, 0x0, 0xb04c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000, 0x0, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/229, 0xe5}, {&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000380)=""/169, 0xa9}, {&(0x7f0000000300)=""/62, 0x3e}, {&(0x7f0000000440)=""/108, 0x6c}], 0x6, 0x21, 0x401) (async) 17:16:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400", 0xc}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:13 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 185.219208][T30693] loop4: detected capacity change from 0 to 262160 [ 185.226825][T30693] FAT-fs (loop4): bogus number of reserved sectors [ 185.233432][T30693] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:13 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0xff, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:13 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0xff, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:13 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0xff, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:13 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0x21000000, &(0x7f0000000000)="0cb046377d33f286a8c26851136dc8ef850fd184f0ea0ff4126438dba528", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)="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") 17:16:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400", 0xc}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 185.767149][T31109] loop4: detected capacity change from 0 to 262160 [ 185.780125][T31109] FAT-fs (loop4): bogus number of reserved sectors [ 185.786695][T31109] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:13 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) clone(0x21000000, &(0x7f0000000000)="0cb046377d33f286a8c26851136dc8ef850fd184f0ea0ff4126438dba528", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)="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") 17:16:13 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x14, r2, 0x300, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:14 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:14 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0x21000000, &(0x7f0000000000)="0cb046377d33f286a8c26851136dc8ef850fd184f0ea0ff4126438dba528", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)="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") ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) clone(0x21000000, &(0x7f0000000000)="0cb046377d33f286a8c26851136dc8ef850fd184f0ea0ff4126438dba528", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)="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") (async) 17:16:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400", 0xc}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:14 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 186.081590][T31327] loop4: detected capacity change from 0 to 262160 [ 186.089210][T31327] FAT-fs (loop4): bogus number of reserved sectors [ 186.095910][T31327] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:14 executing program 2: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x58, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x585}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x4800) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:14 executing program 2: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x58, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x585}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x4800) (async) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:14 executing program 2: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x58, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x585}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x4800) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x58, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x585}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x4800) (async) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240", 0x12}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 186.388002][T31740] loop4: detected capacity change from 0 to 262160 [ 186.395329][T31740] FAT-fs (loop4): invalid media value (0x00) [ 186.401386][T31740] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:14 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x165280, 0x0) sendto$inet6(r1, &(0x7f0000000040)="dc4f4830", 0x4, 0x8c0, &(0x7f0000000080)={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, '\x00', 0x26}}, 0x1c) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240", 0x12}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 186.709124][T31849] loop4: detected capacity change from 0 to 262160 [ 186.717403][T31849] FAT-fs (loop4): invalid media value (0x00) [ 186.723517][T31849] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:14 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x165280, 0x0) sendto$inet6(r1, &(0x7f0000000040)="dc4f4830", 0x4, 0x8c0, &(0x7f0000000080)={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, '\x00', 0x26}}, 0x1c) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x165280, 0x0) (async) sendto$inet6(r1, &(0x7f0000000040)="dc4f4830", 0x4, 0x8c0, &(0x7f0000000080)={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, '\x00', 0x26}}, 0x1c) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:14 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:14 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x14, r2, 0x300, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:14 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x165280, 0x0) sendto$inet6(r1, &(0x7f0000000040)="dc4f4830", 0x4, 0x8c0, &(0x7f0000000080)={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, '\x00', 0x26}}, 0x1c) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:14 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:14 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x7f, 0xde, 0x2e, 0xfa, 0x0, 0x5, 0x104, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3, 0x3}, 0x428, 0x10001, 0x400, 0x6, 0x9, 0x4, 0x6, 0x0, 0x5, 0x0, 0xfb47}, r2, 0xf, r3, 0x1) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000000)=""/232, 0xe8, 0x7, 0x2}) fallocate(r1, 0x0, 0x101, 0x6) fallocate(r0, 0x2, 0x9, 0x3) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) signalfd4(r4, &(0x7f00000001c0)={[0xfff]}, 0x8, 0x400) 17:16:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240", 0x12}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:15 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x7f, 0xde, 0x2e, 0xfa, 0x0, 0x5, 0x104, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3, 0x3}, 0x428, 0x10001, 0x400, 0x6, 0x9, 0x4, 0x6, 0x0, 0x5, 0x0, 0xfb47}, r2, 0xf, r3, 0x1) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000000)=""/232, 0xe8, 0x7, 0x2}) fallocate(r1, 0x0, 0x101, 0x6) fallocate(r0, 0x2, 0x9, 0x3) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) signalfd4(r4, &(0x7f00000001c0)={[0xfff]}, 0x8, 0x400) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) fork() (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x7f, 0xde, 0x2e, 0xfa, 0x0, 0x5, 0x104, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3, 0x3}, 0x428, 0x10001, 0x400, 0x6, 0x9, 0x4, 0x6, 0x0, 0x5, 0x0, 0xfb47}, r2, 0xf, r3, 0x1) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000000)=""/232, 0xe8, 0x7, 0x2}) (async) fallocate(r1, 0x0, 0x101, 0x6) (async) fallocate(r0, 0x2, 0x9, 0x3) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) (async) signalfd4(r4, &(0x7f00000001c0)={[0xfff]}, 0x8, 0x400) (async) [ 187.019331][T32069] loop4: detected capacity change from 0 to 262160 [ 187.029025][T32069] FAT-fs (loop4): invalid media value (0x00) [ 187.035128][T32069] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:15 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x7f, 0xde, 0x2e, 0xfa, 0x0, 0x5, 0x104, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3, 0x3}, 0x428, 0x10001, 0x400, 0x6, 0x9, 0x4, 0x6, 0x0, 0x5, 0x0, 0xfb47}, r2, 0xf, r3, 0x1) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000000)=""/232, 0xe8, 0x7, 0x2}) fallocate(r1, 0x0, 0x101, 0x6) fallocate(r0, 0x2, 0x9, 0x3) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) signalfd4(r4, &(0x7f00000001c0)={[0xfff]}, 0x8, 0x400) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) fork() (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x7f, 0xde, 0x2e, 0xfa, 0x0, 0x5, 0x104, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3, 0x3}, 0x428, 0x10001, 0x400, 0x6, 0x9, 0x4, 0x6, 0x0, 0x5, 0x0, 0xfb47}, r2, 0xf, r3, 0x1) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000180)={&(0x7f0000000000)=""/232, 0xe8, 0x7, 0x2}) (async) fallocate(r1, 0x0, 0x101, 0x6) (async) fallocate(r0, 0x2, 0x9, 0x3) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) (async) signalfd4(r4, &(0x7f00000001c0)={[0xfff]}, 0x8, 0x400) (async) 17:16:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:15 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3b9}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x5, 0x6, 0xf, 0x2, 0x2, [{0xb01b, 0x6, 0x6}, {0xffffffff, 0x2, 0x7, '\x00', 0x2}]}) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080", 0x15}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 187.473755][T32382] loop4: detected capacity change from 0 to 262160 [ 187.481682][T32382] FAT-fs (loop4): invalid media value (0x00) [ 187.487784][T32382] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:15 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3b9}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x5, 0x6, 0xf, 0x2, 0x2, [{0xb01b, 0x6, 0x6}, {0xffffffff, 0x2, 0x7, '\x00', 0x2}]}) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3b9}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x5, 0x6, 0xf, 0x2, 0x2, [{0xb01b, 0x6, 0x6}, {0xffffffff, 0x2, 0x7, '\x00', 0x2}]}) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:15 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) 17:16:15 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3b9}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x5, 0x6, 0xf, 0x2, 0x2, [{0xb01b, 0x6, 0x6}, {0xffffffff, 0x2, 0x7, '\x00', 0x2}]}) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3b9}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x5, 0x6, 0xf, 0x2, 0x2, [{0xb01b, 0x6, 0x6}, {0xffffffff, 0x2, 0x7, '\x00', 0x2}]}) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080", 0x15}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:15 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:15 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x18, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) [ 187.783285][T32593] loop4: detected capacity change from 0 to 262160 [ 187.794469][T32593] FAT-fs (loop4): invalid media value (0x00) [ 187.800547][T32593] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:15 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000380)={{r0}, 0x0, 0x0, @unused=[0x4, 0x5, 0x5, 0x4], @name="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"}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) flistxattr(r1, &(0x7f0000000180)=""/160, 0xa0) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x2314, &(0x7f0000000000)={0x0, 0xe35e, 0x1, 0x3, 0x100, 0x0, r1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 17:16:15 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000380)={{r0}, 0x0, 0x0, @unused=[0x4, 0x5, 0x5, 0x4], @name="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"}) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) (async) flistxattr(r1, &(0x7f0000000180)=""/160, 0xa0) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x2314, &(0x7f0000000000)={0x0, 0xe35e, 0x1, 0x3, 0x100, 0x0, r1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 17:16:16 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000380)={{r0}, 0x0, 0x0, @unused=[0x4, 0x5, 0x5, 0x4], @name="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"}) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) flistxattr(r1, &(0x7f0000000180)=""/160, 0xa0) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) syz_io_uring_setup(0x2314, &(0x7f0000000000)={0x0, 0xe35e, 0x1, 0x3, 0x100, 0x0, r1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 17:16:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:16 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4000}], 0x1, 0x81) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080", 0x15}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 188.323888][ T554] loop4: detected capacity change from 0 to 262160 [ 188.333210][ T554] FAT-fs (loop4): invalid media value (0x00) [ 188.339263][ T554] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:16 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4000}], 0x1, 0x81) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:16 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) 17:16:16 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4000}], 0x1, 0x81) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x4000}], 0x1, 0x81) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:16 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:16 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x18, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:16 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="000008000000000000000010", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32=0x0, @ANYRES64]) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)=0x1) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r3) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x9, 0x7, 0x5, 0x9, 0x0, 0x8e, 0x4110, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x10000, 0x6, 0x1f, 0x0, 0x7f, 0x401, 0x0, 0x0, 0x3ff, 0x0, 0x6}, 0x0, 0x8, r2, 0x9) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 188.628839][ T766] loop4: detected capacity change from 0 to 262160 [ 188.653141][ T766] FAT-fs (loop4): bogus number of FAT sectors [ 188.659336][ T766] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:16 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="000008000000000000000010", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32=0x0, @ANYRES64]) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)=0x1) (async) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r3) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x9, 0x7, 0x5, 0x9, 0x0, 0x8e, 0x4110, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x10000, 0x6, 0x1f, 0x0, 0x7f, 0x401, 0x0, 0x0, 0x3ff, 0x0, 0x6}, 0x0, 0x8, r2, 0x9) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0x0, 0x0, 0x0, 0x0, 0x0) 17:16:16 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="000008000000000000000010", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32=0x0, @ANYRES64]) (async) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)=0x1) (async, rerun: 64) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (rerun: 64) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async, rerun: 32) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r3) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x9, 0x7, 0x5, 0x9, 0x0, 0x8e, 0x4110, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x10000, 0x6, 0x1f, 0x0, 0x7f, 0x401, 0x0, 0x0, 0x3ff, 0x0, 0x6}, 0x0, 0x8, r2, 0x9) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) clone(0x0, 0x0, 0x0, 0x0, 0x0) 17:16:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:17 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getspdinfo={0x14, 0x25, 0x10, 0x70bd2d, 0x25dfdbfe, 0x9, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x2, 0x400000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000001c0)={0x0, @aes128}) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 189.171752][ T1201] loop4: detected capacity change from 0 to 262160 [ 189.179660][ T1201] FAT-fs (loop4): bogus number of FAT sectors [ 189.185773][ T1201] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:17 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getspdinfo={0x14, 0x25, 0x10, 0x70bd2d, 0x25dfdbfe, 0x9, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x20) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x2, 0x400000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000001c0)={0x0, @aes128}) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:17 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) 17:16:17 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async, rerun: 64) fallocate(r0, 0x18, 0x101, 0x6) (async, rerun: 64) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getspdinfo={0x14, 0x25, 0x10, 0x70bd2d, 0x25dfdbfe, 0x9, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x2, 0x400000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000001c0)={0x0, @aes128}) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:17 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:17 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x18, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) [ 189.467409][ T1419] loop4: detected capacity change from 0 to 262160 [ 189.478173][ T1419] FAT-fs (loop4): bogus number of FAT sectors [ 189.484251][ T1419] FAT-fs (loop4): Can't find a valid FAT filesystem 17:16:17 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:17 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:17 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async, rerun: 32) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) (async, rerun: 32) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:18 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000000)="2f3b88225a38c8ce20d285b12a14e7edf35761b347290ecf06b59e01e0e1278b4e5b352439be52c8ed45571c7e2f4e915a11e9eb09829d88714cfaf953bb4fa7947d5379959d4007961c81656a4c24745245e67dfab6b3bbca94dc271949ca573e7597944deb194b7e952fb262cf4df88ac9b31ead1f1f602454e3f1667d58f1389b8e35cea8d00ae4dfc44e6f940138a62feb7f3ea40b14c82805d9c99476629903fc5742253ec7c08ceeb3614e2c3a0078ec173cb964b74c4206918f279c2d08ab2c0b6c1d565f34b8ce055648f8ac357ed3250b88412dcabd5f5ef89a70ea7522", 0xe2}, {&(0x7f0000000180)="9fdfce03d13ce11a01bbbb96e0e13793fdf3f5e791934d264d31b82eb694a3d7efb863c5101869bf4ec4bd751ca99e43e7170f9d2f84f96368f76d3cd4938f33cd49529ca7477f9ff866f8be712886930713c8563fdf740e1f4316a7b10f2d16c9d8174c86752a430eb2fbf26530c1874205850736ad133cace5b12ffb8b2aab507da89fe422", 0x86}, {&(0x7f0000000240)="a6af2ba12b4fa564bcb6afb6f92c6c5bf3754766651eb193ff76980dd77f3b9299c68e314d20f7af3d436b036872abbe1f7274091a8178698bb5a63f23691ae6275b6b506831a54c8002d7f3817acffb657d", 0x52}, {&(0x7f0000000380)="4a11b4ac96697b6ad9f788c055f3aae4febfbb9f098fef4d27e4a0b899df5d6c843f45aa2ba16869b0e504a5ada8b5dbae3b3991d5ef462bd649fd7f96eaace899632f57c9da0603ce35b283806629e1a23fa21b95cc4f2bd6aed991ee77a53ba5e86135c1fbc34bf45800df1beb78e852eb1adc7661a6c6d51cfb8db7bb980daa655cc80961d32fdcf533e14c722fcb75018d34ba06e46ecb79daf1e1367b878af950", 0xa3}, {&(0x7f00000002c0)}, {&(0x7f0000000440)="272399d90991aed354ba1f845e3ee503a594def40a60c5650ef82caafb07d2785cbbed4d8731526ea14f1b71c392062b3a8b392d44e2abe3bd38b6d45fec68d2bed03272b85b8715372c24554a82673cb3e53d66d103e4b51dbf98ff9707a5e4491cf4f0465ffa516a3114d1eb4d6dd1564f7af9f082e0b2a68fc584e9533dbcbbe5d85fc8cbdcab284a597254a64133445b673eb0a50c1ed37a015162ddfa8d257637800fd6c32553c8e6a40be09892f5d1e08b2b93354ec096024f4d9b55821fa685c66d4acb472d298eff7f5b22448ec8ea543d791d6f", 0xd8}, {&(0x7f0000000300)}, {&(0x7f0000000540)="88e0d7d7b723989cd0a1a85851b09bf521552927ec100206d2a364baf0faca1f4e2d193d9867fee019cb71115faf54db864b411e91d5ad9c21e2a19d0cbb2ba6be84fb0c8d9d6632e6596c22c082e9db7be0979fd194ff965f69387a6668f739bc493aec862c9374a33226c2bdbd0a0dffa47fa481626d44863365b5d5c43a6c47d48f59946808fd538a1ada7547b6913412403d923b56ab7eabe469a8ad", 0x9e}, {&(0x7f0000000600)="a963ef16092a3ea2d761e4d3318751c6e97bdb584d69e34c5514b30000b277105b196cb6d28f18d6b26b547cd845e458c9898bf3e35cb220d5d9ff5e502076b98f1bb626d3361091f4095f9f913f9bc23922d8406524d9ce0a8cd8553068e80b074834759309192859a883a0d8267275d2de566ea2d0813634d0ff212bb69ec35607aca85239e4a912457f4fbc4af6f6fd07ab2c100c3985012ca6d25a73a0cfde4b203a7c4e96ee0cfd7e136d62f17cda8088c3483673dd4bb5352b225618b8711479ec43c4cb0b60f66d35", 0xcc}], 0x9) fallocate(r0, 0x18, 0x101, 0x6) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f00000002c0)) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 190.017479][ T1907] loop4: detected capacity change from 0 to 262160 [ 190.115163][ T2023] loop4: detected capacity change from 0 to 262160 17:16:18 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) 17:16:18 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000000)="2f3b88225a38c8ce20d285b12a14e7edf35761b347290ecf06b59e01e0e1278b4e5b352439be52c8ed45571c7e2f4e915a11e9eb09829d88714cfaf953bb4fa7947d5379959d4007961c81656a4c24745245e67dfab6b3bbca94dc271949ca573e7597944deb194b7e952fb262cf4df88ac9b31ead1f1f602454e3f1667d58f1389b8e35cea8d00ae4dfc44e6f940138a62feb7f3ea40b14c82805d9c99476629903fc5742253ec7c08ceeb3614e2c3a0078ec173cb964b74c4206918f279c2d08ab2c0b6c1d565f34b8ce055648f8ac357ed3250b88412dcabd5f5ef89a70ea7522", 0xe2}, {&(0x7f0000000180)="9fdfce03d13ce11a01bbbb96e0e13793fdf3f5e791934d264d31b82eb694a3d7efb863c5101869bf4ec4bd751ca99e43e7170f9d2f84f96368f76d3cd4938f33cd49529ca7477f9ff866f8be712886930713c8563fdf740e1f4316a7b10f2d16c9d8174c86752a430eb2fbf26530c1874205850736ad133cace5b12ffb8b2aab507da89fe422", 0x86}, {&(0x7f0000000240)="a6af2ba12b4fa564bcb6afb6f92c6c5bf3754766651eb193ff76980dd77f3b9299c68e314d20f7af3d436b036872abbe1f7274091a8178698bb5a63f23691ae6275b6b506831a54c8002d7f3817acffb657d", 0x52}, {&(0x7f0000000380)="4a11b4ac96697b6ad9f788c055f3aae4febfbb9f098fef4d27e4a0b899df5d6c843f45aa2ba16869b0e504a5ada8b5dbae3b3991d5ef462bd649fd7f96eaace899632f57c9da0603ce35b283806629e1a23fa21b95cc4f2bd6aed991ee77a53ba5e86135c1fbc34bf45800df1beb78e852eb1adc7661a6c6d51cfb8db7bb980daa655cc80961d32fdcf533e14c722fcb75018d34ba06e46ecb79daf1e1367b878af950", 0xa3}, {&(0x7f00000002c0)}, {&(0x7f0000000440)="272399d90991aed354ba1f845e3ee503a594def40a60c5650ef82caafb07d2785cbbed4d8731526ea14f1b71c392062b3a8b392d44e2abe3bd38b6d45fec68d2bed03272b85b8715372c24554a82673cb3e53d66d103e4b51dbf98ff9707a5e4491cf4f0465ffa516a3114d1eb4d6dd1564f7af9f082e0b2a68fc584e9533dbcbbe5d85fc8cbdcab284a597254a64133445b673eb0a50c1ed37a015162ddfa8d257637800fd6c32553c8e6a40be09892f5d1e08b2b93354ec096024f4d9b55821fa685c66d4acb472d298eff7f5b22448ec8ea543d791d6f", 0xd8}, {&(0x7f0000000300)}, {&(0x7f0000000540)="88e0d7d7b723989cd0a1a85851b09bf521552927ec100206d2a364baf0faca1f4e2d193d9867fee019cb71115faf54db864b411e91d5ad9c21e2a19d0cbb2ba6be84fb0c8d9d6632e6596c22c082e9db7be0979fd194ff965f69387a6668f739bc493aec862c9374a33226c2bdbd0a0dffa47fa481626d44863365b5d5c43a6c47d48f59946808fd538a1ada7547b6913412403d923b56ab7eabe469a8ad", 0x9e}, {&(0x7f0000000600)="a963ef16092a3ea2d761e4d3318751c6e97bdb584d69e34c5514b30000b277105b196cb6d28f18d6b26b547cd845e458c9898bf3e35cb220d5d9ff5e502076b98f1bb626d3361091f4095f9f913f9bc23922d8406524d9ce0a8cd8553068e80b074834759309192859a883a0d8267275d2de566ea2d0813634d0ff212bb69ec35607aca85239e4a912457f4fbc4af6f6fd07ab2c100c3985012ca6d25a73a0cfde4b203a7c4e96ee0cfd7e136d62f17cda8088c3483673dd4bb5352b225618b8711479ec43c4cb0b60f66d35", 0xcc}], 0x9) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f00000002c0)) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:18 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:18 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x1c, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:18 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async, rerun: 64) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000000)="2f3b88225a38c8ce20d285b12a14e7edf35761b347290ecf06b59e01e0e1278b4e5b352439be52c8ed45571c7e2f4e915a11e9eb09829d88714cfaf953bb4fa7947d5379959d4007961c81656a4c24745245e67dfab6b3bbca94dc271949ca573e7597944deb194b7e952fb262cf4df88ac9b31ead1f1f602454e3f1667d58f1389b8e35cea8d00ae4dfc44e6f940138a62feb7f3ea40b14c82805d9c99476629903fc5742253ec7c08ceeb3614e2c3a0078ec173cb964b74c4206918f279c2d08ab2c0b6c1d565f34b8ce055648f8ac357ed3250b88412dcabd5f5ef89a70ea7522", 0xe2}, {&(0x7f0000000180)="9fdfce03d13ce11a01bbbb96e0e13793fdf3f5e791934d264d31b82eb694a3d7efb863c5101869bf4ec4bd751ca99e43e7170f9d2f84f96368f76d3cd4938f33cd49529ca7477f9ff866f8be712886930713c8563fdf740e1f4316a7b10f2d16c9d8174c86752a430eb2fbf26530c1874205850736ad133cace5b12ffb8b2aab507da89fe422", 0x86}, {&(0x7f0000000240)="a6af2ba12b4fa564bcb6afb6f92c6c5bf3754766651eb193ff76980dd77f3b9299c68e314d20f7af3d436b036872abbe1f7274091a8178698bb5a63f23691ae6275b6b506831a54c8002d7f3817acffb657d", 0x52}, {&(0x7f0000000380)="4a11b4ac96697b6ad9f788c055f3aae4febfbb9f098fef4d27e4a0b899df5d6c843f45aa2ba16869b0e504a5ada8b5dbae3b3991d5ef462bd649fd7f96eaace899632f57c9da0603ce35b283806629e1a23fa21b95cc4f2bd6aed991ee77a53ba5e86135c1fbc34bf45800df1beb78e852eb1adc7661a6c6d51cfb8db7bb980daa655cc80961d32fdcf533e14c722fcb75018d34ba06e46ecb79daf1e1367b878af950", 0xa3}, {&(0x7f00000002c0)}, {&(0x7f0000000440)="272399d90991aed354ba1f845e3ee503a594def40a60c5650ef82caafb07d2785cbbed4d8731526ea14f1b71c392062b3a8b392d44e2abe3bd38b6d45fec68d2bed03272b85b8715372c24554a82673cb3e53d66d103e4b51dbf98ff9707a5e4491cf4f0465ffa516a3114d1eb4d6dd1564f7af9f082e0b2a68fc584e9533dbcbbe5d85fc8cbdcab284a597254a64133445b673eb0a50c1ed37a015162ddfa8d257637800fd6c32553c8e6a40be09892f5d1e08b2b93354ec096024f4d9b55821fa685c66d4acb472d298eff7f5b22448ec8ea543d791d6f", 0xd8}, {&(0x7f0000000300)}, {&(0x7f0000000540)="88e0d7d7b723989cd0a1a85851b09bf521552927ec100206d2a364baf0faca1f4e2d193d9867fee019cb71115faf54db864b411e91d5ad9c21e2a19d0cbb2ba6be84fb0c8d9d6632e6596c22c082e9db7be0979fd194ff965f69387a6668f739bc493aec862c9374a33226c2bdbd0a0dffa47fa481626d44863365b5d5c43a6c47d48f59946808fd538a1ada7547b6913412403d923b56ab7eabe469a8ad", 0x9e}, {&(0x7f0000000600)="a963ef16092a3ea2d761e4d3318751c6e97bdb584d69e34c5514b30000b277105b196cb6d28f18d6b26b547cd845e458c9898bf3e35cb220d5d9ff5e502076b98f1bb626d3361091f4095f9f913f9bc23922d8406524d9ce0a8cd8553068e80b074834759309192859a883a0d8267275d2de566ea2d0813634d0ff212bb69ec35607aca85239e4a912457f4fbc4af6f6fd07ab2c100c3985012ca6d25a73a0cfde4b203a7c4e96ee0cfd7e136d62f17cda8088c3483673dd4bb5352b225618b8711479ec43c4cb0b60f66d35", 0xcc}], 0x9) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f00000002c0)) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 190.324321][ T2050] loop4: detected capacity change from 0 to 262160 17:16:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, 0x0) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:18 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000000)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 190.424947][ T2241] loop4: detected capacity change from 0 to 262160 17:16:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:18 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000000)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, 0x0) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:18 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000000)) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 190.866896][ T2355] loop4: detected capacity change from 0 to 262160 17:16:19 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, 0x0, 0x0) 17:16:19 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = signalfd4(r0, &(0x7f0000000000)={[0x80000000]}, 0x8, 0x80000) dup3(r0, r1, 0x80000) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, 0x0) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:19 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:19 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x1c, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:19 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async, rerun: 64) fallocate(r0, 0x18, 0x101, 0x6) (async, rerun: 64) r1 = signalfd4(r0, &(0x7f0000000000)={[0x80000000]}, 0x8, 0x80000) dup3(r0, r1, 0x80000) (async, rerun: 32) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 17:16:19 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = signalfd4(r0, &(0x7f0000000000)={[0x80000000]}, 0x8, 0x80000) dup3(r0, r1, 0x80000) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) signalfd4(r0, &(0x7f0000000000)={[0x80000000]}, 0x8, 0x80000) (async) dup3(r0, r1, 0x80000) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) [ 191.263776][ T2755] loop4: detected capacity change from 0 to 262160 17:16:19 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x101000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000380)) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:19 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x101000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000380)) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x101000, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000380)) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 191.714711][ T2986] loop4: detected capacity change from 0 to 262160 17:16:19 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x101000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000380)) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x101000, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000380)) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:20 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x20671, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8001) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0x10360800, &(0x7f0000000040)="5aa20fea3ff9431c1f85b94d44a4f2a4e41de530d6426d", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)="3f6e90c08694572afa91429001cd5dc734fcf92f5f4cb6b7af20") 17:16:20 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, 0x0, 0x0) 17:16:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:20 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:20 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x1c, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) [ 192.022970][ T3201] loop4: detected capacity change from 0 to 262160 17:16:20 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x20671, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8001) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) clone(0x10360800, &(0x7f0000000040)="5aa20fea3ff9431c1f85b94d44a4f2a4e41de530d6426d", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)="3f6e90c08694572afa91429001cd5dc734fcf92f5f4cb6b7af20") ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x20671, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8001) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) clone(0x10360800, &(0x7f0000000040)="5aa20fea3ff9431c1f85b94d44a4f2a4e41de530d6426d", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)="3f6e90c08694572afa91429001cd5dc734fcf92f5f4cb6b7af20") (async) 17:16:20 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x20671, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8001) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) clone(0x10360800, &(0x7f0000000040)="5aa20fea3ff9431c1f85b94d44a4f2a4e41de530d6426d", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)="3f6e90c08694572afa91429001cd5dc734fcf92f5f4cb6b7af20") 17:16:20 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:20 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1) (async) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) [ 192.560023][ T3626] loop4: detected capacity change from 0 to 262160 17:16:20 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:20 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0xc, 0x6, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x40011}, 0x801) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:20 executing program 3: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) socket(0x10, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, 0x0, 0x0) 17:16:20 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0xc, 0x6, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x40011}, 0x801) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:20 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:20 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x74, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x60, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5b, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076"}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:20 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0xc, 0x6, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x40011}, 0x801) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0xc, 0x6, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x40011}, 0x801) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) [ 192.910092][ T4041] loop4: detected capacity change from 0 to 262160 17:16:21 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='xfer_secondary_pool\x00', r0}, 0x10) writev(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)="5b55834e8119d497cf226aa38922f08790b6aa97a7840dcd45f4b8232fb783", 0x1f}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0x5, 0x8) 17:16:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:21 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='xfer_secondary_pool\x00', r0}, 0x10) writev(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)="5b55834e8119d497cf226aa38922f08790b6aa97a7840dcd45f4b8232fb783", 0x1f}], 0x1) (async) write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0x5, 0x8) 17:16:21 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='xfer_secondary_pool\x00', r0}, 0x10) writev(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)="5b55834e8119d497cf226aa38922f08790b6aa97a7840dcd45f4b8232fb783", 0x1f}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0x5, 0x8) [ 193.402534][ T4256] loop4: detected capacity change from 0 to 262160 17:16:21 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) read$eventfd(r1, &(0x7f0000000000), 0x8) flock(r0, 0x1) fallocate(r0, 0x18, 0x101, 0x6) clone(0x98e8932bdff5eb4a, 0x0, 0x0, 0x0, 0x0) 17:16:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:21 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) read$eventfd(r1, &(0x7f0000000000), 0x8) flock(r0, 0x1) fallocate(r0, 0x18, 0x101, 0x6) clone(0x98e8932bdff5eb4a, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) read$eventfd(r1, &(0x7f0000000000), 0x8) (async) flock(r0, 0x1) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0x98e8932bdff5eb4a, 0x0, 0x0, 0x0, 0x0) (async) 17:16:21 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:21 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x74, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x60, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5b, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076"}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 193.710437][ T4572] loop4: detected capacity change from 0 to 262160 17:16:21 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) read$eventfd(r1, &(0x7f0000000000), 0x8) flock(r0, 0x1) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0x98e8932bdff5eb4a, 0x0, 0x0, 0x0, 0x0) [ 193.768332][ T4598] loop3: detected capacity change from 0 to 262160 17:16:21 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x63b}, 0x10000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x28c8}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x1, 0x0, 0x6, 0x8}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @exit, @cb_func={0x18, 0x1, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x52, 0x0, 0x0, 0x41000, 0x16, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xd, 0x401, 0x7}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[r1, r1]}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) fchdir(r0) 17:16:22 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:22 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x63b}, 0x10000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) fallocate(r1, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x28c8}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x1, 0x0, 0x6, 0x8}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @exit, @cb_func={0x18, 0x1, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x52, 0x0, 0x0, 0x41000, 0x16, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xd, 0x401, 0x7}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[r1, r1]}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) fchdir(r0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x63b}, 0x10000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x28c8}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x1, 0x0, 0x6, 0x8}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @exit, @cb_func={0x18, 0x1, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x52, 0x0, 0x0, 0x41000, 0x16, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xd, 0x401, 0x7}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[r1, r1]}, 0x80) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) fchdir(r0) (async) 17:16:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:22 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x63b}, 0x10000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) fallocate(r1, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x28c8}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x1, 0x0, 0x6, 0x8}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @exit, @cb_func={0x18, 0x1, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x52, 0x0, 0x0, 0x41000, 0x16, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xd, 0x401, 0x7}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[r1, r1]}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async, rerun: 32) fchdir(r0) (rerun: 32) [ 194.255492][ T4794] loop4: detected capacity change from 0 to 262160 [ 194.262486][ T4798] loop3: detected capacity change from 0 to 262160 17:16:22 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@loopback, @multicast2}, &(0x7f0000000040)=0x8) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 194.505892][ T5132] loop3: detected capacity change from 0 to 262160 17:16:22 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:22 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x74, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x60, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5b, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076"}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:22 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@loopback, @multicast2}, &(0x7f0000000040)=0x8) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@loopback, @multicast2}, &(0x7f0000000040)=0x8) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) [ 194.650595][ T5140] loop4: detected capacity change from 0 to 262160 [ 194.768419][ T5261] loop3: detected capacity change from 0 to 262160 17:16:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:23 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@loopback, @multicast2}, &(0x7f0000000040)=0x8) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@loopback, @multicast2}, &(0x7f0000000040)=0x8) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) 17:16:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 195.105045][ T5267] loop3: detected capacity change from 0 to 262160 [ 195.119734][ T5271] loop4: detected capacity change from 0 to 262160 17:16:23 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3ba}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x5, 0x9, 0x683d361c, 0x4, @empty, @mcast1, 0x7, 0x80be, 0x8, 0x7}}) 17:16:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) 17:16:23 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3ba}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x5, 0x9, 0x683d361c, 0x4, @empty, @mcast1, 0x7, 0x80be, 0x8, 0x7}}) [ 195.298911][ T5559] loop3: detected capacity change from 0 to 262160 17:16:23 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:23 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xa0, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x8c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x86, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c4"}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:23 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3ba}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x5, 0x9, 0x683d361c, 0x4, @empty, @mcast1, 0x7, 0x80be, 0x8, 0x7}}) 17:16:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 195.518063][ T5682] loop3: detected capacity change from 0 to 262160 [ 195.547981][ T5727] loop4: detected capacity change from 0 to 262160 17:16:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:23 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) dup(r0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0xfc, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) flistxattr(r1, &(0x7f0000000000)=""/146, 0x92) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) fallocate(r2, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 195.955437][ T5734] loop3: detected capacity change from 0 to 262160 [ 195.967161][ T5738] loop4: detected capacity change from 0 to 262160 17:16:24 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) dup(r0) (async) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0xfc, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) flistxattr(r1, &(0x7f0000000000)=""/146, 0x92) (async) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r2, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:24 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) dup(r0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0xfc, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) flistxattr(r1, &(0x7f0000000000)=""/146, 0x92) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) fallocate(r2, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) dup(r0) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0xfc, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) flistxattr(r1, &(0x7f0000000000)=""/146, 0x92) (async) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r2, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 196.170901][ T6075] loop3: detected capacity change from 0 to 262160 17:16:24 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:24 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xa0, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x8c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x86, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c4"}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:24 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0xc44300, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80000001) [ 196.358271][ T6086] loop4: detected capacity change from 0 to 262160 [ 196.408376][ T6088] loop3: detected capacity change from 0 to 262160 17:16:24 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0xc44300, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0xc44300, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80000001) 17:16:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 196.813229][ T6095] loop3: detected capacity change from 0 to 262160 [ 196.821762][ T6099] loop4: detected capacity change from 0 to 262160 17:16:24 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0xc44300, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async, rerun: 32) fallocate(r0, 0x18, 0x101, 0x6) (rerun: 32) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:24 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x5, 0x204c3, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80000001) [ 197.005637][ T6372] loop3: detected capacity change from 0 to 262160 17:16:25 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:25 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xa0, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x8c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x86, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c4"}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:25 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x5, 0x204c3, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x5, 0x204c3, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 197.192781][ T6419] loop3: detected capacity change from 0 to 262160 [ 197.232597][ T6424] loop4: detected capacity change from 0 to 262160 17:16:25 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x5, 0x204c3, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 197.397571][ T6631] loop3: detected capacity change from 0 to 262160 17:16:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:25 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="000000002e2f66697a1b6c653000"]) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x8, 0x7, 0x7f, 0x20, 0x0, 0x2dad, 0x8, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0xe000, 0x5, 0x81, 0x0, 0x0, 0x6, 0x9, 0x0, 0x9, 0x0, 0x81}, 0x0, 0xa, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) open(&(0x7f0000000180)='./file0\x00', 0x90800, 0x0) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000008, 0x810, r2, 0xdc383000) 17:16:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 197.665392][ T6635] loop4: detected capacity change from 0 to 262160 [ 197.671185][ T6640] loop3: detected capacity change from 0 to 262160 17:16:25 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="000000002e2f66697a1b6c653000"]) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x8, 0x7, 0x7f, 0x20, 0x0, 0x2dad, 0x8, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0xe000, 0x5, 0x81, 0x0, 0x0, 0x6, 0x9, 0x0, 0x9, 0x0, 0x81}, 0x0, 0xa, r0, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) (async) open(&(0x7f0000000180)='./file0\x00', 0x90800, 0x0) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000008, 0x810, r2, 0xdc383000) 17:16:26 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:26 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xb4, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xa0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x9c, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb00750"}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:26 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="000000002e2f66697a1b6c653000"]) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x8, 0x7, 0x7f, 0x20, 0x0, 0x2dad, 0x8, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0xe000, 0x5, 0x81, 0x0, 0x0, 0x6, 0x9, 0x0, 0x9, 0x0, 0x81}, 0x0, 0xa, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fallocate(r1, 0x18, 0x101, 0x6) open(&(0x7f0000000180)='./file0\x00', 0x90800, 0x0) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000008, 0x810, r2, 0xdc383000) 17:16:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) 17:16:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:26 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x8}, [@exit]}, &(0x7f0000000040)='syzkaller\x00', 0x81, 0x12, &(0x7f0000000080)=""/18, 0x41000, 0x7, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xe, 0x59b, 0xafdf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0, r0]}, 0x80) pread64(r1, &(0x7f0000000280)=""/9, 0x9, 0x7fffffff) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) dup3(r2, r3, 0x0) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) [ 198.041480][ T6853] loop3: detected capacity change from 0 to 262160 [ 198.053832][ T6884] loop4: detected capacity change from 0 to 262160 17:16:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) [ 198.213069][ T7064] loop3: detected capacity change from 0 to 262160 17:16:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:26 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x8}, [@exit]}, &(0x7f0000000040)='syzkaller\x00', 0x81, 0x12, &(0x7f0000000080)=""/18, 0x41000, 0x7, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xe, 0x59b, 0xafdf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0, r0]}, 0x80) pread64(r1, &(0x7f0000000280)=""/9, 0x9, 0x7fffffff) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) (async) dup3(r2, r3, 0x0) (async, rerun: 64) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 17:16:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) [ 198.517564][ T7070] loop4: detected capacity change from 0 to 262160 [ 198.520075][ T7072] loop3: detected capacity change from 0 to 262160 17:16:26 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x8}, [@exit]}, &(0x7f0000000040)='syzkaller\x00', 0x81, 0x12, &(0x7f0000000080)=""/18, 0x41000, 0x7, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xe, 0x59b, 0xafdf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0, r0]}, 0x80) pread64(r1, &(0x7f0000000280)=""/9, 0x9, 0x7fffffff) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x18, 0x101, 0x6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) dup3(r2, r3, 0x0) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x8}, [@exit]}, &(0x7f0000000040)='syzkaller\x00', 0x81, 0x12, &(0x7f0000000080)=""/18, 0x41000, 0x7, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xe, 0x59b, 0xafdf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0, r0]}, 0x80) (async) pread64(r1, &(0x7f0000000280)=""/9, 0x9, 0x7fffffff) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x18, 0x101, 0x6) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r2, &(0x7f0000000140), 0xffffffe2) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) (async) dup3(r2, r3, 0x0) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:26 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:26 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xb4, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xa0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x9c, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb00750"}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:26 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x0, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 198.885651][ T7283] loop3: detected capacity change from 0 to 262160 [ 198.892574][ T7287] loop4: detected capacity change from 0 to 262160 17:16:27 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x0, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (async) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) fallocate(r0, 0x0, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async) 17:16:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 199.056503][ T7427] loop3: detected capacity change from 0 to 262160 17:16:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:27 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) fallocate(r0, 0x0, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) 17:16:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 17:16:27 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}, @in6={0xa, 0x4e21, 0xfffff001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e20, @rand_addr=0x64010101}, @in={0x2, 0x4e20, @remote}], 0x4c) fallocate(r0, 0x18, 0x101, 0x6) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 199.376090][ T7501] loop4: detected capacity change from 0 to 262160 [ 199.387495][ T7506] loop3: detected capacity change from 0 to 262160 17:16:27 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) 17:16:27 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xb4, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xa0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x9c, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb00750"}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:27 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) (rerun: 64) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}, @in6={0xa, 0x4e21, 0xfffff001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e20, @rand_addr=0x64010101}, @in={0x2, 0x4e20, @remote}], 0x4c) (async) fallocate(r0, 0x18, 0x101, 0x6) (async, rerun: 32) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 17:16:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 17:16:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:27 executing program 2: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x3) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x81, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x204c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000, 0x3b9}, 0x10100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000140), 0xffffffe2) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) (async, rerun: 64) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}, @in6={0xa, 0x4e21, 0xfffff001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e20, @rand_addr=0x64010101}, @in={0x2, 0x4e20, @remote}], 0x4c) (rerun: 64) fallocate(r0, 0x18, 0x101, 0x6) (async) clone(0xf000000, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 199.741271][ T7720] loop3: detected capacity change from 0 to 262160 [ 199.750462][ T7726] loop4: detected capacity change from 0 to 262160 17:16:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 199.864041][ T7928] loop2: detected capacity change from 0 to 262160 17:16:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 17:16:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 200.235970][ T8031] loop4: detected capacity change from 0 to 262160 [ 200.236145][ T8032] loop3: detected capacity change from 0 to 262160 [ 200.253699][ T8036] loop2: detected capacity change from 0 to 262160 17:16:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 17:16:28 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) [ 200.463877][ T8140] loop3: detected capacity change from 0 to 262160 17:16:28 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc0, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xac, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xa7, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d05072"}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) [ 200.592191][ T8145] loop2: detected capacity change from 0 to 262160 [ 200.593870][ T8148] loop4: detected capacity change from 0 to 262160 17:16:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 200.697695][ T8230] loop3: detected capacity change from 0 to 262160 [ 200.763047][ T8256] loop4: detected capacity change from 0 to 262160 [ 200.772997][ T8257] loop2: detected capacity change from 0 to 262160 17:16:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 17:16:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 201.090989][ T8362] loop3: detected capacity change from 0 to 262160 [ 201.091351][ T8361] loop2: detected capacity change from 0 to 262160 [ 201.115436][ T8366] loop4: detected capacity change from 0 to 262160 17:16:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:29 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r3, &(0x7f0000000140), 0xffffffe2) [ 201.296923][ T8470] loop2: detected capacity change from 0 to 262160 17:16:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:29 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc0, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xac, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xa7, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d05072"}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 201.437432][ T8574] loop4: detected capacity change from 0 to 262160 [ 201.452912][ T8580] loop3: detected capacity change from 0 to 262160 [ 201.464949][ T8581] loop2: detected capacity change from 0 to 262160 17:16:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 201.627256][ T8686] loop4: detected capacity change from 0 to 262160 [ 201.653805][ T8688] loop2: detected capacity change from 0 to 262160 17:16:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 201.952034][ T8792] loop3: detected capacity change from 0 to 262160 [ 201.962104][ T8798] loop2: detected capacity change from 0 to 262160 [ 201.962658][ T8796] loop4: detected capacity change from 0 to 262160 17:16:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 202.127702][ T8905] loop2: detected capacity change from 0 to 262160 17:16:30 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x18, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x18}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 202.204670][ T8932] loop4: detected capacity change from 0 to 262160 17:16:30 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc0, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xac, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xa7, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d05072"}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 202.289965][ T9015] loop3: detected capacity change from 0 to 262160 [ 202.303810][ T9020] loop2: detected capacity change from 0 to 262160 17:16:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 202.424361][ T9133] loop4: detected capacity change from 0 to 262160 [ 202.464355][ T9135] loop2: detected capacity change from 0 to 262160 17:16:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 202.802321][ T9243] loop2: detected capacity change from 0 to 262160 [ 202.809364][ T9245] loop4: detected capacity change from 0 to 262160 [ 202.809648][ T9246] loop3: detected capacity change from 0 to 262160 17:16:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 202.970007][ T9352] loop2: detected capacity change from 0 to 262160 17:16:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:31 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x18, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x18}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 203.049266][ T9401] loop4: detected capacity change from 0 to 262160 17:16:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:31 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc4, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xac, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b85"}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 203.155356][ T9459] loop2: detected capacity change from 0 to 262160 17:16:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 203.249212][ T9530] loop4: detected capacity change from 0 to 262160 [ 203.267618][ T9566] loop3: detected capacity change from 0 to 262160 [ 203.317668][ T9569] loop2: detected capacity change from 0 to 262160 17:16:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 203.664192][ T9674] loop2: detected capacity change from 0 to 262160 [ 203.664225][ T9675] loop4: detected capacity change from 0 to 262160 [ 203.682431][ T9679] loop3: detected capacity change from 0 to 262160 17:16:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 203.819826][ T9784] loop2: detected capacity change from 0 to 262160 17:16:31 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x18, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x18}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 203.868057][ T9786] loop4: detected capacity change from 0 to 262160 17:16:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:32 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc4, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xac, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b85"}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:32 executing program 3: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 204.023846][ T9894] loop2: detected capacity change from 0 to 262160 [ 204.054368][ T9896] loop4: detected capacity change from 0 to 262160 17:16:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 204.193487][T10003] loop2: detected capacity change from 0 to 262160 17:16:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:32 executing program 3: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 204.521999][T10106] loop2: detected capacity change from 0 to 262160 [ 204.530258][T10111] loop4: detected capacity change from 0 to 262160 17:16:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:32 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 204.748438][T10216] loop2: detected capacity change from 0 to 262160 [ 204.757234][T10220] loop4: detected capacity change from 0 to 262160 17:16:32 executing program 3: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:32 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc4, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xac, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b85"}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 204.966544][T10330] loop4: detected capacity change from 0 to 262160 [ 204.977351][T10332] loop2: detected capacity change from 0 to 262160 17:16:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 205.135893][T10435] loop2: detected capacity change from 0 to 262160 17:16:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:33 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 205.370909][T10539] loop3: detected capacity change from 0 to 262160 [ 205.371158][T10541] loop4: detected capacity change from 0 to 262160 [ 205.408479][T10543] loop2: detected capacity change from 0 to 262160 17:16:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:33 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 205.567246][T10650] loop4: detected capacity change from 0 to 262160 [ 205.568707][T10649] loop2: detected capacity change from 0 to 262160 17:16:33 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc8, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xaf, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427b"}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:33 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 205.778506][T10760] loop2: detected capacity change from 0 to 262160 [ 205.785778][T10759] loop4: detected capacity change from 0 to 262160 17:16:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 205.899144][T10864] loop3: detected capacity change from 0 to 262160 [ 205.944491][T10866] loop2: detected capacity change from 0 to 262160 17:16:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:34 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 206.219189][T10971] loop2: detected capacity change from 0 to 262160 [ 206.220557][T10972] loop4: detected capacity change from 0 to 262160 [ 206.242995][T10975] loop3: detected capacity change from 0 to 262160 17:16:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:34 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 206.406758][T11081] loop2: detected capacity change from 0 to 262160 [ 206.484708][T11085] loop4: detected capacity change from 0 to 262160 17:16:34 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc8, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xaf, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427b"}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 206.601116][T11191] loop2: detected capacity change from 0 to 262160 17:16:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 206.686258][T11289] loop4: detected capacity change from 0 to 262160 [ 206.705156][T11296] loop3: detected capacity change from 0 to 262160 [ 206.741262][T11298] loop2: detected capacity change from 0 to 262160 17:16:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 207.075603][T11406] loop4: detected capacity change from 0 to 262160 [ 207.081345][T11407] loop2: detected capacity change from 0 to 262160 [ 207.085296][T11409] loop3: detected capacity change from 0 to 262160 17:16:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 207.272335][T11515] loop2: detected capacity change from 0 to 262160 [ 207.279495][T11517] loop4: detected capacity change from 0 to 262160 17:16:35 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc8, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xaf, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427b"}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 207.457823][T11626] loop2: detected capacity change from 0 to 262160 [ 207.494454][T11629] loop4: detected capacity change from 0 to 262160 17:16:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 207.572762][T11731] loop3: detected capacity change from 0 to 262160 [ 207.623723][T11734] loop2: detected capacity change from 0 to 262160 17:16:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 207.923142][T11841] loop4: detected capacity change from 0 to 262160 [ 207.931120][T11842] loop2: detected capacity change from 0 to 262160 17:16:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 208.097037][T11950] loop2: detected capacity change from 0 to 262160 17:16:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 208.173572][T11953] loop4: detected capacity change from 0 to 262160 17:16:36 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc8, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb0, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5"}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 208.288948][T12060] loop2: detected capacity change from 0 to 262160 17:16:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 208.418289][T12166] loop4: detected capacity change from 0 to 262160 [ 208.480212][T12168] loop2: detected capacity change from 0 to 262160 17:16:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 208.771946][T12274] loop4: detected capacity change from 0 to 262160 [ 208.772105][T12275] loop2: detected capacity change from 0 to 262160 17:16:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 208.944738][T12385] loop2: detected capacity change from 0 to 262160 [ 208.984266][T12387] loop4: detected capacity change from 0 to 262160 [ 208.997372][ T8799] ================================================================== [ 209.005458][ T8799] BUG: KCSAN: data-race in copy_page_to_iter / fat16_ent_put [ 209.012837][ T8799] [ 209.015156][ T8799] write to 0xffff88815347e2ae of 2 bytes by task 12385 on cpu 1: [ 209.022866][ T8799] fat16_ent_put+0x24/0x50 [ 209.027284][ T8799] fat_ent_write+0x5e/0xd0 [ 209.031700][ T8799] fat_chain_add+0x15b/0x410 [ 209.036304][ T8799] fat_get_block+0x48d/0x610 [ 209.040894][ T8799] __block_write_begin_int+0x4c5/0x1010 [ 209.046436][ T8799] cont_write_begin+0x4cf/0x7b0 [ 209.051300][ T8799] fat_write_begin+0x61/0xf0 [ 209.055885][ T8799] generic_perform_write+0x1c8/0x400 [ 209.061185][ T8799] __generic_file_write_iter+0xf7/0x2b0 [ 209.066730][ T8799] generic_file_write_iter+0x75/0x130 [ 209.072102][ T8799] vfs_write+0x7f5/0x950 [ 209.076347][ T8799] ksys_write+0xd9/0x190 [ 209.080589][ T8799] __x64_sys_write+0x3e/0x50 [ 209.085187][ T8799] do_syscall_64+0x44/0xd0 [ 209.089605][ T8799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 209.095508][ T8799] [ 209.097824][ T8799] read to 0xffff88815347e000 of 1024 bytes by task 8799 on cpu 0: [ 209.105615][ T8799] copy_page_to_iter+0x2cb/0x950 [ 209.110551][ T8799] filemap_read+0x138b/0x16d0 [ 209.115216][ T8799] generic_file_read_iter+0x72/0x2a0 [ 209.120492][ T8799] blkdev_read_iter+0x96/0x140 [ 209.125246][ T8799] vfs_read+0x66c/0x750 [ 209.129391][ T8799] ksys_read+0xd9/0x190 [ 209.133532][ T8799] __x64_sys_read+0x3e/0x50 [ 209.138023][ T8799] do_syscall_64+0x44/0xd0 [ 209.142424][ T8799] entry_SYSCALL_64_after_hwframe+0x44/0xae 17:16:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:37 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc8, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb0, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5"}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) [ 209.148302][ T8799] [ 209.150605][ T8799] Reported by Kernel Concurrency Sanitizer on: [ 209.156734][ T8799] CPU: 0 PID: 8799 Comm: udevd Not tainted 5.16.0-rc6-syzkaller #0 [ 209.164622][ T8799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.174667][ T8799] ================================================================== 17:16:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 209.294976][T12580] FAT-fs (loop3): bogus number of reserved sectors [ 209.301576][T12580] FAT-fs (loop3): Can't find a valid FAT filesystem [ 209.324864][T12602] loop2: detected capacity change from 0 to 262160 17:16:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 209.495465][T12705] loop2: detected capacity change from 0 to 262160 17:16:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x18, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}}, 0x18}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 209.648244][T12812] loop4: detected capacity change from 0 to 262160 [ 209.674443][T12815] loop2: detected capacity change from 0 to 262160 17:16:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 209.752903][T12827] FAT-fs (loop3): bogus number of reserved sectors [ 209.759498][T12827] FAT-fs (loop3): Can't find a valid FAT filesystem [ 209.842846][T12925] loop2: detected capacity change from 0 to 262160 [ 209.862045][T12927] loop4: detected capacity change from 0 to 262160 17:16:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:38 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xc8, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb0, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5"}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x200118a0) 17:16:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 210.039268][T13033] loop2: detected capacity change from 0 to 262160 17:16:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 210.158018][T13139] loop4: detected capacity change from 0 to 262160 [ 210.175177][T13141] loop2: detected capacity change from 0 to 262160 [ 210.239524][T13145] FAT-fs (loop3): bogus number of reserved sectors [ 210.246175][T13145] FAT-fs (loop3): Can't find a valid FAT filesystem 17:16:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x18, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}}, 0x18}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 210.497575][T13251] loop4: detected capacity change from 0 to 262160 [ 210.504468][T13253] loop2: detected capacity change from 0 to 262160 [ 210.546433][T13255] FAT-fs (loop3): bogus number of reserved sectors [ 210.552999][T13255] FAT-fs (loop3): Can't find a valid FAT filesystem 17:16:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 210.726185][T13362] loop2: detected capacity change from 0 to 262160 [ 210.745850][T13364] loop4: detected capacity change from 0 to 262160 17:16:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:38 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}}, 0x200118a0) 17:16:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 210.894570][T13469] loop2: detected capacity change from 0 to 262160 17:16:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 210.949932][T13471] loop4: detected capacity change from 0 to 262160 [ 210.973770][T13498] FAT-fs (loop3): bogus number of reserved sectors [ 210.980374][T13498] FAT-fs (loop3): Can't find a valid FAT filesystem [ 211.071711][T13580] loop2: detected capacity change from 0 to 262160 17:16:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x18, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}}, 0x18}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 211.341690][T13686] loop2: detected capacity change from 0 to 262160 [ 211.348645][T13687] loop4: detected capacity change from 0 to 262160 [ 211.356949][T13689] FAT-fs (loop3): bogus number of reserved sectors [ 211.363491][T13689] FAT-fs (loop3): Can't find a valid FAT filesystem 17:16:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 211.505430][T13795] loop2: detected capacity change from 0 to 262160 [ 211.560368][T13798] loop4: detected capacity change from 0 to 262160 17:16:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 211.737303][T13902] loop2: detected capacity change from 0 to 262160 17:16:39 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}}, 0x200118a0) 17:16:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 211.810578][T13907] loop3: detected capacity change from 0 to 262160 [ 211.810581][T13908] loop4: detected capacity change from 0 to 262160 17:16:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 211.850885][T13907] FAT-fs (loop3): bogus number of reserved sectors [ 211.857498][T13907] FAT-fs (loop3): Can't find a valid FAT filesystem [ 211.947339][T14016] loop2: detected capacity change from 0 to 262160 17:16:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 212.201423][T14120] loop2: detected capacity change from 0 to 262160 [ 212.215121][T14121] loop4: detected capacity change from 0 to 262160 [ 212.236115][T14125] loop3: detected capacity change from 0 to 262160 [ 212.250413][T14125] FAT-fs (loop3): bogus number of reserved sectors [ 212.257014][T14125] FAT-fs (loop3): Can't find a valid FAT filesystem 17:16:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 212.393348][T14230] loop2: detected capacity change from 0 to 262160 [ 212.504433][T14333] loop4: detected capacity change from 0 to 262160 17:16:40 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:40 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}}, 0x200118a0) 17:16:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 212.626221][T14338] loop3: detected capacity change from 0 to 262160 [ 212.639667][T14338] FAT-fs (loop3): bogus number of reserved sectors [ 212.646291][T14338] FAT-fs (loop3): Can't find a valid FAT filesystem [ 212.676414][T14341] loop2: detected capacity change from 0 to 262160 [ 212.705089][T14345] loop4: detected capacity change from 0 to 262160 17:16:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 212.920003][T14450] loop4: detected capacity change from 0 to 262160 17:16:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 213.070784][T14455] loop2: detected capacity change from 0 to 262160 [ 213.074517][T14456] loop3: detected capacity change from 0 to 262160 [ 213.089159][T14456] FAT-fs (loop3): bogus number of reserved sectors [ 213.095719][T14456] FAT-fs (loop3): Can't find a valid FAT filesystem [ 213.098939][T14459] loop4: detected capacity change from 0 to 262160 17:16:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) [ 213.343443][T14566] loop2: detected capacity change from 0 to 262160 [ 213.350487][T14567] loop4: detected capacity change from 0 to 262160 17:16:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:41 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x0) 17:16:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) [ 213.456786][T14658] loop3: detected capacity change from 0 to 262160 [ 213.476052][T14658] FAT-fs (loop3): bogus number of reserved sectors [ 213.482582][T14658] FAT-fs (loop3): Can't find a valid FAT filesystem 17:16:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 213.528687][T14675] loop2: detected capacity change from 0 to 262160 17:16:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) [ 213.625403][T14717] loop4: detected capacity change from 0 to 262160 [ 213.685800][T14784] loop2: detected capacity change from 0 to 262160 17:16:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r7, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r6, 0xffffffffffffffff, r7, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r8, r1) 17:16:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 213.919188][T14888] loop2: detected capacity change from 0 to 262160 [ 213.927901][T14891] loop4: detected capacity change from 0 to 262160 [ 213.928315][T14892] loop3: detected capacity change from 0 to 262160 [ 213.944783][T14892] FAT-fs (loop3): bogus number of reserved sectors [ 213.951353][T14892] FAT-fs (loop3): Can't find a valid FAT filesystem 17:16:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 214.157535][T15000] loop4: detected capacity change from 0 to 262160 [ 214.182877][T15002] loop2: detected capacity change from 0 to 262160 17:16:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:42 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) 17:16:42 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x0) 17:16:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 214.332795][T15107] loop3: detected capacity change from 0 to 262160 [ 214.348580][T15107] FAT-fs (loop3): bogus number of reserved sectors [ 214.355112][T15107] FAT-fs (loop3): Can't find a valid FAT filesystem [ 214.401327][T15110] loop4: detected capacity change from 0 to 262160 [ 214.439640][T15115] loop2: detected capacity change from 0 to 262160 17:16:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 214.607924][T15219] loop4: detected capacity change from 0 to 262160 17:16:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) 17:16:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 214.790934][T15223] loop2: detected capacity change from 0 to 262160 [ 214.794217][T15225] loop4: detected capacity change from 0 to 262160 [ 214.801853][T15228] loop3: detected capacity change from 0 to 262160 [ 214.822208][T15228] FAT-fs (loop3): bogus number of reserved sectors [ 214.828903][T15228] FAT-fs (loop3): Can't find a valid FAT filesystem 17:16:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) 17:16:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 214.973251][T15334] loop2: detected capacity change from 0 to 262160 17:16:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) [ 215.052551][T15365] loop4: detected capacity change from 0 to 262160 17:16:43 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/23, 0x17}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r4, &(0x7f0000000140), 0xffffffe2) [ 215.154338][T15439] loop2: detected capacity change from 0 to 262160 17:16:43 executing program 5: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r1, &(0x7f0000000140), 0xffffffe2) fchown(r1, 0xffffffffffffffff, 0xee00) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xffffffe2) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0xcc, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "cb4b4df51f3960ed3befde6e679db0c90d3cddf58f345d06374a4524f628c9e02fe46fa5738b9e95ee85b00d8683150e3d99f08b0d49974b9cf4f87f64be157033ca6f3510a6918e6132ad9aa2534a57cb31a6f75b7076418b081c0020fbd768c7c02d70c64577f3bd46ab389f7b6297dcb79801f4ada63c609f58b51d169bd6c6c41c0a10b5b7725d68d4478b78aeae3e096f155cb007506822b5de55cf8115d050720da74b3b858f427be5f7"}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x0) 17:16:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 215.249635][T15505] loop3: detected capacity change from 0 to 262160 [ 215.257581][T15505] FAT-fs (loop3): bogus number of reserved sectors [ 215.264121][T15505] FAT-fs (loop3): Can't find a valid FAT filesystem [ 215.275593][T15548] loop4: detected capacity change from 0 to 262160 [ 215.354074][T15552] loop2: detected capacity change from 0 to 262160 17:16:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 17:16:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) [ 215.544530][T15657] loop4: detected capacity change from 0 to 262160 [ 215.552568][T15659] loop2: detected capacity change from 0 to 262160 17:16:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000740000000b000000009500"/26], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000001c0)='tlb_flush\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_delvlan={0x24, 0x70, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x40, 0x10}, 0xc) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) read$eventfd(r6, &(0x7f0000000140), 0xffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffee}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000280)=""/220, 0x40f00, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x6, 0x1, 0x95}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r6, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r7, r1) 17:16:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400", 0xc}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 17:16:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40d1, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2