0)=[{&(0x7f0000000180)={0x40, 0x1e, 0x200, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x4a, 0x0, 0x0, @u32=0x9}, @typed={0x8, 0x69, 0x0, 0x0, @u32=0x80}, @nested={0xd, 0x5f, 0x0, 0x1, [@generic='D', @typed={0x8, 0x32, 0x0, 0x0, @u32=0x5}]}, @typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x71, 0x0, 0x0, @ipv4=@local}]}, 0x40}, {&(0x7f0000000d40)={0x43c, 0x3c, 0x400, 0x70bd29, 0x25dfdbfe, "", [@generic="b48e76e509f4e7650c3d25fef5cffadd8c34c706d38caaedc4282a58443420906de8b59cb2afde2a436f66e8de8486efcf1051358d85ee13abfc03f531f38b32ccb498a5eaa77bd264cf48451e4589884c216dbec8fbfcef2c7e87934cf1147819a962006dccef1182af205cad8e70796a4e33b47fcf042f5bf9fa3eb58fab4a1e5760e819d0f68c5a73208e17dfbef0daf8", @nested={0x280, 0x64, 0x0, 0x1, [@typed={0xee, 0x71, 0x0, 0x0, @binary="b1bc9045394d2600c650405e860bc0d44f8d24a4f2211b732ca88a8b1984be7aae0832911a93e614f0b8aa8103958e3941256a9ba39960ae79a61acab2d51e30e5006be22585d407e1068c8fa37385854b3bbddd1c710e0c6c04f91ae6f10c595fb2dd9be0e3e50dfb257d68d35ea0549b1e2090c438a073e269b050055f5fa7fbdbc3548edb968e5ae24687dbf3ae2c44bf2a6a4eae39057975dd3c871af031243d3654e420dfbccf25ef1ae843c996d014e2beea7db714af6a1d7886b5e045a84e6adc8f310dadcfb8db88c3b2baf4ed3b989c9e2af3b07ef39424eb0d2869173562b14e55c35a1240"}, @generic="899de831e2e926cb653dcc9027799c7d2aa2bcdb87b91d0d06bbb725f3596a834f470176ec2cd5f415f99e6fac36a507d2ec15d8c338c339480ed3538af463", @typed={0xa2, 0x32, 0x0, 0x0, @binary="9e9c9c024bc57b4ecb76e5c0355eec0035dd3a49c30b26152960512c5828ff6c09879a6264ac93e9627a276ea77f05fb5eb9210a3398bd212740dbd610b5b8f815ddbc0fa0bf861257327aea5f1673306d204a3a99f7bc5246068405f91c781f5165da0066b948e2a2a103a7b72e8b66794bb056690ea3e95894f7674f84b366fff138b1fcdd5208bcdf4cb2f13c9fe47f5a418b336c769535d4652e3d3c"}, @generic="1e31abfe847caf799f4d04e65a7893167dc23166a680484e8ddff5fa46e8015d12ed6c3177002eb054b25f394ff075996c5620436ed4aa31851f651a2661265995d2f721d299ba466d8048d2232b05aa372de60f1678c86f846666333ca3c55a1b31bff63dc4fea69c79d48a4b2a03cf0625c8fcf1d5664bffbbfa64dde5c7ec0654505f625061177c99878577ca5ceaef8851850b7dee5317", @typed={0x8, 0x40, 0x0, 0x0, @pid}, @typed={0x8, 0x95, 0x0, 0x0, @u32=0x1000}]}, @generic="d71a0e660b86ac1b92d7eb263b24966554b0ad70acb048715785a50f0847aa84cc3ea1f28dccec87c4a045d3d01c6e16415d532f1ca18da444de013d67f6c10571cb63c01083c47c84d3a2a659489cf9acbe8128ee7d8a8b004aaab754b4171686863d18747cf9dd3e107fd272f4ac56af2f14de1b712be5ee2f361de7d633b0757c817aea60a828cde15513952d6e964cc549393902a434e04c951ddf99de3464dad2daafe607648e1ee34ef70463a2df649063e46909fb04e7a72d72c20050b60ee26c07b7e1eebe4869163407ca3d8b384576111b0833bb1dd12ed6056014be", @generic="62eb859413e2ab0b1be915d7f69dbaf3a7ba59d45829a561c3b05926a0907816517d7a170340d6153b601a03422846668e0af2b5a32d"]}, 0x43c}, {&(0x7f0000001180)=ANY=[@ANYBLOB="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"], 0x17c}], 0x3, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78, 0x800}, 0x10000804) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000040)=0x0) prlimit64(r6, 0x6, 0x0, &(0x7f0000000080)) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r9, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:12:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) [ 1862.778594][T19194] loop3: detected capacity change from 0 to 264192 [ 1862.789148][T19193] loop5: detected capacity change from 0 to 264192 [ 1862.883691][T19167] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1862.987152][T19198] loop1: detected capacity change from 0 to 264192 12:12:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) [ 1863.267328][T19201] loop2: detected capacity change from 0 to 264192 12:12:33 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1863.871801][T19207] loop3: detected capacity change from 0 to 264192 12:12:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) [ 1864.195888][T19210] loop1: detected capacity change from 0 to 264192 12:12:34 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1864.957263][T19215] loop3: detected capacity change from 0 to 264192 12:12:35 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) 12:12:35 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:36 executing program 5: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) 12:12:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0xab, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_BCAST_FLOOD={0x5}, @IFLA_BRPORT_VLAN_TUNNEL={0x5}]}}}]}, 0x4c}}, 0x0) (async) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000400)={[0x1]}, 0x8) r4 = socket$caif_stream(0x25, 0x1, 0x2) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbff, 0x80000}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000180)={0x40, 0x1e, 0x200, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x4a, 0x0, 0x0, @u32=0x9}, @typed={0x8, 0x69, 0x0, 0x0, @u32=0x80}, @nested={0xd, 0x5f, 0x0, 0x1, [@generic='D', @typed={0x8, 0x32, 0x0, 0x0, @u32=0x5}]}, @typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x71, 0x0, 0x0, @ipv4=@local}]}, 0x40}, {&(0x7f0000000d40)={0x43c, 0x3c, 0x400, 0x70bd29, 0x25dfdbfe, "", [@generic="b48e76e509f4e7650c3d25fef5cffadd8c34c706d38caaedc4282a58443420906de8b59cb2afde2a436f66e8de8486efcf1051358d85ee13abfc03f531f38b32ccb498a5eaa77bd264cf48451e4589884c216dbec8fbfcef2c7e87934cf1147819a962006dccef1182af205cad8e70796a4e33b47fcf042f5bf9fa3eb58fab4a1e5760e819d0f68c5a73208e17dfbef0daf8", @nested={0x280, 0x64, 0x0, 0x1, [@typed={0xee, 0x71, 0x0, 0x0, @binary="b1bc9045394d2600c650405e860bc0d44f8d24a4f2211b732ca88a8b1984be7aae0832911a93e614f0b8aa8103958e3941256a9ba39960ae79a61acab2d51e30e5006be22585d407e1068c8fa37385854b3bbddd1c710e0c6c04f91ae6f10c595fb2dd9be0e3e50dfb257d68d35ea0549b1e2090c438a073e269b050055f5fa7fbdbc3548edb968e5ae24687dbf3ae2c44bf2a6a4eae39057975dd3c871af031243d3654e420dfbccf25ef1ae843c996d014e2beea7db714af6a1d7886b5e045a84e6adc8f310dadcfb8db88c3b2baf4ed3b989c9e2af3b07ef39424eb0d2869173562b14e55c35a1240"}, @generic="899de831e2e926cb653dcc9027799c7d2aa2bcdb87b91d0d06bbb725f3596a834f470176ec2cd5f415f99e6fac36a507d2ec15d8c338c339480ed3538af463", @typed={0xa2, 0x32, 0x0, 0x0, @binary="9e9c9c024bc57b4ecb76e5c0355eec0035dd3a49c30b26152960512c5828ff6c09879a6264ac93e9627a276ea77f05fb5eb9210a3398bd212740dbd610b5b8f815ddbc0fa0bf861257327aea5f1673306d204a3a99f7bc5246068405f91c781f5165da0066b948e2a2a103a7b72e8b66794bb056690ea3e95894f7674f84b366fff138b1fcdd5208bcdf4cb2f13c9fe47f5a418b336c769535d4652e3d3c"}, @generic="1e31abfe847caf799f4d04e65a7893167dc23166a680484e8ddff5fa46e8015d12ed6c3177002eb054b25f394ff075996c5620436ed4aa31851f651a2661265995d2f721d299ba466d8048d2232b05aa372de60f1678c86f846666333ca3c55a1b31bff63dc4fea69c79d48a4b2a03cf0625c8fcf1d5664bffbbfa64dde5c7ec0654505f625061177c99878577ca5ceaef8851850b7dee5317", @typed={0x8, 0x40, 0x0, 0x0, @pid}, @typed={0x8, 0x95, 0x0, 0x0, @u32=0x1000}]}, @generic="d71a0e660b86ac1b92d7eb263b24966554b0ad70acb048715785a50f0847aa84cc3ea1f28dccec87c4a045d3d01c6e16415d532f1ca18da444de013d67f6c10571cb63c01083c47c84d3a2a659489cf9acbe8128ee7d8a8b004aaab754b4171686863d18747cf9dd3e107fd272f4ac56af2f14de1b712be5ee2f361de7d633b0757c817aea60a828cde15513952d6e964cc549393902a434e04c951ddf99de3464dad2daafe607648e1ee34ef70463a2df649063e46909fb04e7a72d72c20050b60ee26c07b7e1eebe4869163407ca3d8b384576111b0833bb1dd12ed6056014be", @generic="62eb859413e2ab0b1be915d7f69dbaf3a7ba59d45829a561c3b05926a0907816517d7a170340d6153b601a03422846668e0af2b5a32d"]}, 0x43c}, {&(0x7f0000001180)=ANY=[@ANYBLOB="7c0100002f0020002abd7000ffdbdf256c019280d2fbc58f189b352349070cf6d05cdc88a315e25ed3085fa22b3e9ab06539577ae303d7b0a114c6f89d6faa7dee8c9c28e2f9ce76c17bb0c4fc6935fbe2061aba56aa3f30ba698a5e6c6884dbabbfb78bf1cd9e2f7b7345402bf312fc3fe9863ee8ffac736212e011ff85b5ad295fb9a4e04d4d907cf53c6335dba20d14e51643a258eb7a81138493066f246040678c6c4a0007007eb2f759ed2c5fc1c7085bbc15778d863e3b9dc81ec137d83dc73ddbdf529cf543576c7b45a5fe5cf9ac878bad4afb07dc77d24ce158fdcb2cdd698cc07d53a440c30016906a00008b000f00f9d02ac35f48a43ed29e1ddf1973a36dde0252a57a7fe5f0ee80da7d2aaed82c28b6d78716bf53a10e0520221a5cdbe388a435eccd850f2df50780ef482012e9a0eb3b897cc0aa5b707c6aad4c707b5989afa79a144a92971fdb3dc7882bffa8a75f9b88416e21604b64dd33e79bbb427b0775a141d5d5bce23ad8b194252d6711c9e849572ab700d375"], 0x17c}], 0x3, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78, 0x800}, 0x10000804) (async) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000040)=0x0) prlimit64(r6, 0x6, 0x0, &(0x7f0000000080)) (async) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) (async) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) (async) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r9, 0x0, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:12:46 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:12:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:12:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:12:46 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:46 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 1876.161353][T19236] loop3: detected capacity change from 0 to 264192 [ 1876.172913][T19238] loop1: detected capacity change from 0 to 264192 [ 1876.173330][T19234] loop2: detected capacity change from 0 to 264192 [ 1876.189901][T19235] loop5: detected capacity change from 0 to 264192 12:12:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:12:46 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:46 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 1876.314584][T19242] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1876.347621][T19255] loop1: detected capacity change from 0 to 264192 12:12:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1876.564101][T19240] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1876.589016][T19259] loop1: detected capacity change from 0 to 264192 12:12:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1877.953383][T19242] I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1877.973770][T19261] loop2: detected capacity change from 0 to 264192 12:12:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0xab, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_BCAST_FLOOD={0x5}, @IFLA_BRPORT_VLAN_TUNNEL={0x5}]}}}]}, 0x4c}}, 0x0) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000400)={[0x1]}, 0x8) r4 = socket$caif_stream(0x25, 0x1, 0x2) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbff, 0x80000}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000180)={0x40, 0x1e, 0x200, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x4a, 0x0, 0x0, @u32=0x9}, @typed={0x8, 0x69, 0x0, 0x0, @u32=0x80}, @nested={0xd, 0x5f, 0x0, 0x1, [@generic='D', @typed={0x8, 0x32, 0x0, 0x0, @u32=0x5}]}, @typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x71, 0x0, 0x0, @ipv4=@local}]}, 0x40}, {&(0x7f0000000d40)={0x43c, 0x3c, 0x400, 0x70bd29, 0x25dfdbfe, "", [@generic="b48e76e509f4e7650c3d25fef5cffadd8c34c706d38caaedc4282a58443420906de8b59cb2afde2a436f66e8de8486efcf1051358d85ee13abfc03f531f38b32ccb498a5eaa77bd264cf48451e4589884c216dbec8fbfcef2c7e87934cf1147819a962006dccef1182af205cad8e70796a4e33b47fcf042f5bf9fa3eb58fab4a1e5760e819d0f68c5a73208e17dfbef0daf8", @nested={0x280, 0x64, 0x0, 0x1, [@typed={0xee, 0x71, 0x0, 0x0, @binary="b1bc9045394d2600c650405e860bc0d44f8d24a4f2211b732ca88a8b1984be7aae0832911a93e614f0b8aa8103958e3941256a9ba39960ae79a61acab2d51e30e5006be22585d407e1068c8fa37385854b3bbddd1c710e0c6c04f91ae6f10c595fb2dd9be0e3e50dfb257d68d35ea0549b1e2090c438a073e269b050055f5fa7fbdbc3548edb968e5ae24687dbf3ae2c44bf2a6a4eae39057975dd3c871af031243d3654e420dfbccf25ef1ae843c996d014e2beea7db714af6a1d7886b5e045a84e6adc8f310dadcfb8db88c3b2baf4ed3b989c9e2af3b07ef39424eb0d2869173562b14e55c35a1240"}, @generic="899de831e2e926cb653dcc9027799c7d2aa2bcdb87b91d0d06bbb725f3596a834f470176ec2cd5f415f99e6fac36a507d2ec15d8c338c339480ed3538af463", @typed={0xa2, 0x32, 0x0, 0x0, @binary="9e9c9c024bc57b4ecb76e5c0355eec0035dd3a49c30b26152960512c5828ff6c09879a6264ac93e9627a276ea77f05fb5eb9210a3398bd212740dbd610b5b8f815ddbc0fa0bf861257327aea5f1673306d204a3a99f7bc5246068405f91c781f5165da0066b948e2a2a103a7b72e8b66794bb056690ea3e95894f7674f84b366fff138b1fcdd5208bcdf4cb2f13c9fe47f5a418b336c769535d4652e3d3c"}, @generic="1e31abfe847caf799f4d04e65a7893167dc23166a680484e8ddff5fa46e8015d12ed6c3177002eb054b25f394ff075996c5620436ed4aa31851f651a2661265995d2f721d299ba466d8048d2232b05aa372de60f1678c86f846666333ca3c55a1b31bff63dc4fea69c79d48a4b2a03cf0625c8fcf1d5664bffbbfa64dde5c7ec0654505f625061177c99878577ca5ceaef8851850b7dee5317", @typed={0x8, 0x40, 0x0, 0x0, @pid}, @typed={0x8, 0x95, 0x0, 0x0, @u32=0x1000}]}, @generic="d71a0e660b86ac1b92d7eb263b24966554b0ad70acb048715785a50f0847aa84cc3ea1f28dccec87c4a045d3d01c6e16415d532f1ca18da444de013d67f6c10571cb63c01083c47c84d3a2a659489cf9acbe8128ee7d8a8b004aaab754b4171686863d18747cf9dd3e107fd272f4ac56af2f14de1b712be5ee2f361de7d633b0757c817aea60a828cde15513952d6e964cc549393902a434e04c951ddf99de3464dad2daafe607648e1ee34ef70463a2df649063e46909fb04e7a72d72c20050b60ee26c07b7e1eebe4869163407ca3d8b384576111b0833bb1dd12ed6056014be", @generic="62eb859413e2ab0b1be915d7f69dbaf3a7ba59d45829a561c3b05926a0907816517d7a170340d6153b601a03422846668e0af2b5a32d"]}, 0x43c}, {&(0x7f0000001180)=ANY=[@ANYBLOB="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"], 0x17c}], 0x3, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78, 0x800}, 0x10000804) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000040)=0x0) prlimit64(r6, 0x6, 0x0, &(0x7f0000000080)) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r9, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0xab, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_BCAST_FLOOD={0x5}, @IFLA_BRPORT_VLAN_TUNNEL={0x5}]}}}]}, 0x4c}}, 0x0) (async) signalfd(0xffffffffffffffff, &(0x7f0000000400)={[0x1]}, 0x8) (async) socket$caif_stream(0x25, 0x1, 0x2) (async) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbff, 0x80000}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000180)={0x40, 0x1e, 0x200, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x4a, 0x0, 0x0, @u32=0x9}, @typed={0x8, 0x69, 0x0, 0x0, @u32=0x80}, @nested={0xd, 0x5f, 0x0, 0x1, [@generic='D', @typed={0x8, 0x32, 0x0, 0x0, @u32=0x5}]}, @typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x71, 0x0, 0x0, @ipv4=@local}]}, 0x40}, {&(0x7f0000000d40)={0x43c, 0x3c, 0x400, 0x70bd29, 0x25dfdbfe, "", [@generic="b48e76e509f4e7650c3d25fef5cffadd8c34c706d38caaedc4282a58443420906de8b59cb2afde2a436f66e8de8486efcf1051358d85ee13abfc03f531f38b32ccb498a5eaa77bd264cf48451e4589884c216dbec8fbfcef2c7e87934cf1147819a962006dccef1182af205cad8e70796a4e33b47fcf042f5bf9fa3eb58fab4a1e5760e819d0f68c5a73208e17dfbef0daf8", @nested={0x280, 0x64, 0x0, 0x1, [@typed={0xee, 0x71, 0x0, 0x0, @binary="b1bc9045394d2600c650405e860bc0d44f8d24a4f2211b732ca88a8b1984be7aae0832911a93e614f0b8aa8103958e3941256a9ba39960ae79a61acab2d51e30e5006be22585d407e1068c8fa37385854b3bbddd1c710e0c6c04f91ae6f10c595fb2dd9be0e3e50dfb257d68d35ea0549b1e2090c438a073e269b050055f5fa7fbdbc3548edb968e5ae24687dbf3ae2c44bf2a6a4eae39057975dd3c871af031243d3654e420dfbccf25ef1ae843c996d014e2beea7db714af6a1d7886b5e045a84e6adc8f310dadcfb8db88c3b2baf4ed3b989c9e2af3b07ef39424eb0d2869173562b14e55c35a1240"}, @generic="899de831e2e926cb653dcc9027799c7d2aa2bcdb87b91d0d06bbb725f3596a834f470176ec2cd5f415f99e6fac36a507d2ec15d8c338c339480ed3538af463", @typed={0xa2, 0x32, 0x0, 0x0, @binary="9e9c9c024bc57b4ecb76e5c0355eec0035dd3a49c30b26152960512c5828ff6c09879a6264ac93e9627a276ea77f05fb5eb9210a3398bd212740dbd610b5b8f815ddbc0fa0bf861257327aea5f1673306d204a3a99f7bc5246068405f91c781f5165da0066b948e2a2a103a7b72e8b66794bb056690ea3e95894f7674f84b366fff138b1fcdd5208bcdf4cb2f13c9fe47f5a418b336c769535d4652e3d3c"}, @generic="1e31abfe847caf799f4d04e65a7893167dc23166a680484e8ddff5fa46e8015d12ed6c3177002eb054b25f394ff075996c5620436ed4aa31851f651a2661265995d2f721d299ba466d8048d2232b05aa372de60f1678c86f846666333ca3c55a1b31bff63dc4fea69c79d48a4b2a03cf0625c8fcf1d5664bffbbfa64dde5c7ec0654505f625061177c99878577ca5ceaef8851850b7dee5317", @typed={0x8, 0x40, 0x0, 0x0, @pid}, @typed={0x8, 0x95, 0x0, 0x0, @u32=0x1000}]}, @generic="d71a0e660b86ac1b92d7eb263b24966554b0ad70acb048715785a50f0847aa84cc3ea1f28dccec87c4a045d3d01c6e16415d532f1ca18da444de013d67f6c10571cb63c01083c47c84d3a2a659489cf9acbe8128ee7d8a8b004aaab754b4171686863d18747cf9dd3e107fd272f4ac56af2f14de1b712be5ee2f361de7d633b0757c817aea60a828cde15513952d6e964cc549393902a434e04c951ddf99de3464dad2daafe607648e1ee34ef70463a2df649063e46909fb04e7a72d72c20050b60ee26c07b7e1eebe4869163407ca3d8b384576111b0833bb1dd12ed6056014be", @generic="62eb859413e2ab0b1be915d7f69dbaf3a7ba59d45829a561c3b05926a0907816517d7a170340d6153b601a03422846668e0af2b5a32d"]}, 0x43c}, {&(0x7f0000001180)=ANY=[@ANYBLOB="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"], 0x17c}], 0x3, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78, 0x800}, 0x10000804) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000040)) (async) prlimit64(r6, 0x6, 0x0, &(0x7f0000000080)) (async) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c61612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669ffa4aaca0f9d9924be41a9169bdfaf16d1c0b153911b8dd79165789c623c19a39050009539fca4e0b6ec015a7d55555a34effa077faa55c59e88254f54077c668f799bf1683537a9aa024d8b8cc5a5e3d77ec463920e231b7ae0da8d4a43998032c64768221faed60ab386d94af98af00a2b5d525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494da484ebad0407d9440b69ad9f19ab8b4b380a00d72bc0480f949c479757306720399379d9271cf555c14556d0002298237bebfc08c7bd942ae0d5976a942b846970cfd98b9d4139f132a902e4111f2cc5e46ac1c60a9b10c074bfbcd5b09012175484135f0e519f417f030000000000000000003cdf6a662d8bc9c89c91200745f22a5d01dcddff7f356c9b2492aa87e94d4ef4a410c882834867bcd2b6e559d1788e570c8ad943e392957b4f979ea17117a132013afe4f0f6ea5a6c957ada0c548552b571bed564c0a2fcb6da006b5d0fe4886a9edee77cb986319f85dd06a24c37e588959f34d2c5f649b85e5b0baada5f1aad49da960f10ddd86e2d1638f000000000000000000c74d163716ba8219390d65582b33e7dfd27e69d71ac58284cf92d422e0c5dbc402fd48b52216f2c3e683176d47c2599dfd2bc75476f903008c05c8ce9edd1ef5cc236934ac483b8bf80794ecb7ac85ce453c14d29d8c6dcf1855a1ab5c7c2ee8d43e479f3a17a4ac213bfa477f3da41564aac25192cb10e4e4dfc5cfbdef1d4cea17286ec8f6db40ef62b8ca086734223c18c6bb21eae7eca3cb1baa3105a33cfc2cd909df3720d13cd114695fea0cd05735a16d3c4e101ac6713c630445402b02e35e482d465506ceec6947c78fd2bb24c288d719668a712d529d9d0ba7b0db4cca204c6fae33f60c01559eafbed82203bf45781e3681c0c3bd1c18a4090000006bcf4a4043bf4d2ee7575a977b0e0a76647f949edd8e86b58702e5edcd8405db78242b542ab94182db71a0d9a0354ceb4399aa25ecfed552652f93f6215bbfeb4d355a924031313183bef1725570b155341774ec5d59e9047f452c1d18c915bc099fc1d0761c9a56269751c03ae7200c046022c498ff6e470c00a2bd3c9106ac0d56768ea2194ec9a761898b37e170a179f3f9e763c069bc1287cd6f87206490b274b8593a9ea5f40e69aab3f0d268b8e1704051f48254202fbae2b37c6a02960c73b6450700000000001a0ab7f7f0a1ac86e0808ff156322cff5b1808c266e99d4a6a30cd07766a583e885b5c49153d66934b0353ab18e51e7b542138c691f660e521b55f38f60e2598e7e2c924b5e7e6b0efe56f54e61c43d5ed97569d0424a1e8f0245451b4614d1c8c6de6df6ce10a65355e18f4ed1ae93a2309a90a34ce534e9ebc9be91f516b473688cbe6283f8cece3c39c783b0ad612f499d179a37ea386ffd0cc8cb9d718d0cbc9541f9211c50f9c38688a825bfc28931e892e3b35e7ebb26e21aa89cc474793277b41e8e11ed6dd8ef402a531a3dfe9e71aa329b68e237eced63684bb26ee7ca555a20f8bfb643f7b7fd3004998eab55a8bac4098c8c5eac4714beaaa68a9ff64de4288aaf30ce4a3740aeac32f68bedce7fc57d82057a14dc396e6c0d824027e0ca41f64dcec651902a43a7f823c05430ae4058e95706e3758123c6bce7acd85dc70f5d34ef075d78ef4d59289408df0c132546734bcdd252a9299d315665b3d34796153e7a758fa3ea7c98ffdd7f5220104cb0f6811513a8675e84d35e2755e8c4750184ce7df3b657858009edd7e7f37f376dfa54d3b153f8f46a723b9687970c7c4d8413ac565c6bae6bffae4691fa14a297830c7bdfc4ca2ce165216f4beddbfc54b7e155c8b66fcd35069c06a65fb892b3722ce606f4f1ee37674a4179befe2345f840660d86f2e0ea5bbbb906ca78c2261f5336830da236142635fde5999066ceb13dfa413f61f8a08d223e6ac9269cc013e4b06bc30944ce5d13fe0d9881a9eced8a2eb7243bd0c0201114b8a7aeb30df8e594a37470b5a65d5272fef869692d5346705d5996a209aa198b5db0078b3d7d509fcfe5d8b3d149f679aa96ada82c46e9a8a64137d0899a94d1feb005ad0ee3e9fd923d8b65421a650128f4ada78982228663c302c28056d46758b826e6a4c4d330ae7f6e67ef4b2b478a37f6bccc42c7b8eafd419aedaea9a7c08a289ecb45ff8a08347320f7dde4ffecd09f03f86b06bd0762c994c49b045d64bae70a3a35af54cd67f2dfe89d8f707462c504312ec15a6b131ddaa9576b32ffffc26d6072850a8aeccb658e80b15ffd2a1310000000041a49eded823ee7281dd9ee7604ebc530cb74dfdec01f6bf11c4b19fd46faaab65a753d8204594e20fee704e72657fdc584abf7a7bd2ca6471eac4bbff60c78a031700355a17ffb77e7d520d6429a5a6a677a1f149ba9572c5b7ac3e8e3249e06c65e8d8bdf08fb0398b09d50c55e9c113c3004b14b856744bd1a5823febebea0b6ada03c4dc3ef7b685edac99f173ccc00042c176f557d77ff60480b24807eb527c45b6520b239f6c22bd4bd96602c5d1879119eb49a2bb076a82bc6462fccef7ff05d190b25b34deda1f7fc4e7860fb9732222c03f7287afff003257ad8316bc9657cd359e33f4f94701489fd1fcafcc645200344c7562b6897e6bcb01d60cce0f98f0a6"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') (async) readv(r9, 0x0, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) 12:12:53 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:12:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:12:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:12:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1883.276525][T19268] loop1: detected capacity change from 0 to 264192 [ 1883.287955][T19272] loop3: detected capacity change from 0 to 264192 [ 1883.288888][T19271] loop5: detected capacity change from 0 to 264192 [ 1883.305351][T19266] loop2: detected capacity change from 0 to 264192 12:12:54 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:12:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1884.352116][T19283] loop3: detected capacity change from 0 to 264192 [ 1884.439894][T19285] loop1: detected capacity change from 0 to 264192 12:12:55 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:55 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:12:55 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:02 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x4a0500, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0xffffffffffffffff, 0x2, &(0x7f0000000200)=0x4) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:13:02 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:02 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 1892.619736][T19341] loop1: detected capacity change from 0 to 264192 [ 1892.630409][T19344] loop2: detected capacity change from 0 to 264192 [ 1892.642155][T19345] loop5: detected capacity change from 0 to 264192 [ 1892.657114][T19340] loop3: detected capacity change from 0 to 264192 12:13:02 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:03 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:03 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:04 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1894.056393][T19408] loop1: detected capacity change from 0 to 264192 12:13:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1894.377496][T19411] loop3: detected capacity change from 0 to 264192 [ 1895.278158][T19296] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 12:13:09 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x4a0500, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) (async) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0xffffffffffffffff, 0x2, &(0x7f0000000200)=0x4) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:13:09 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1899.666001][T19461] loop5: detected capacity change from 0 to 264192 [ 1899.668001][T19466] loop1: detected capacity change from 0 to 264192 [ 1899.674187][T19464] loop3: detected capacity change from 0 to 264192 [ 1899.694648][T19468] loop2: detected capacity change from 0 to 264192 12:13:10 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1901.146309][T19478] loop3: detected capacity change from 0 to 264192 12:13:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r3, 0x0, 0xf03b2900) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000000000004) 12:13:11 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 1901.464655][T19483] loop1: detected capacity change from 0 to 264192 12:13:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r3, 0x0, 0xf03b2900) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000000000004) [ 1901.682714][T19488] loop1: detected capacity change from 0 to 264192 12:13:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r3, 0x0, 0xf03b2900) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000000000004) [ 1901.885608][T19490] loop1: detected capacity change from 0 to 264192 12:13:19 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x4a0500, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0xffffffffffffffff, 0x2, &(0x7f0000000200)=0x4) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x4a0500, 0x0) (async) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) (async) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0xffffffffffffffff, 0x2, &(0x7f0000000200)=0x4) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) 12:13:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000000000004) 12:13:19 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1909.034891][T19501] loop2: detected capacity change from 0 to 264192 [ 1909.039464][T19503] loop1: detected capacity change from 0 to 264192 [ 1909.042448][T19496] loop3: detected capacity change from 0 to 264192 [ 1909.066051][T19502] loop5: detected capacity change from 0 to 264192 12:13:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000000000004) [ 1909.208592][T19513] loop1: detected capacity change from 0 to 264192 12:13:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000000000004) 12:13:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1909.344542][T19505] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1909.361506][T19517] loop1: detected capacity change from 0 to 264192 [ 1909.368798][T19505] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1909.378440][T19505] Buffer I/O error on dev loop1, logical block 33008, async page read [ 1909.497560][T19505] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1909.513001][T19519] loop1: detected capacity change from 0 to 264192 12:13:20 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1910.584686][T19524] loop3: detected capacity change from 0 to 264192 12:13:20 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004) [ 1912.027322][T19505] I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 12:13:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendto(r1, &(0x7f0000000140), 0x0, 0x4000800, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') prlimit64(0x0, 0x5, &(0x7f0000000140)={0x10001, 0x20}, &(0x7f0000000180)) getdents(r3, 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)="290d28e1a5894b17b4d34acbb89f96c649bc4bf2de7a02df899c823f0283fde2cf8f0f01970cc7ceb4b67858283a90c7a6c70444bc0034e8e6931b07d629a14d0c5c0d91c85989bfaf76f1043490e152b641d127ad3fd3bb9a2bc4960011b29fa2ef5f7659d5e5fbacb3999f44550366fbf9caab064ebdc064833862cb677208a991cd199e6b3c34fd1e3a5d67b3e7b4befdec342f4161fd76a7fe78685130bf5cd7131a6fbeb01d817dbe406711cd9961da2be26c620da5a35b78cf7174f730656edad1029dd486d81691", 0xcb}, {&(0x7f0000000380)="d5dd32057373bd82905ece4b3f7167837d1c93bc2696873b9494bb3ed9fa1f4d204a554b05de884fc645b300ec72519a4d0a7e1aa85db48c854c9e8c68b1e1bf9f0615a37f72b15b8d256c72c9f9a07ba6d8faae7eb0b8b014923afa3703a868e05a7b1110fb92b6078597e7", 0x6c}, {&(0x7f0000000400)="70b4ff9dea7eac697da1ebfacaf3a054e207197f6fbaecc6eee66326caec4f39bcccff2cc3bb933fb7a0fb88b680fdc0c8944dcb00146b576a2e9e5e1889b0147fb46db714ae359b8a63e4a2e86d76b3fdb2e038190fd6308e2172db39124c51c5adf079b80720900843bfccdf4624d84b176093ff5c", 0x76}, {&(0x7f0000000480)="942fed354440ecd4b44ba4530f24b50d0087ab1ffe6caf6bcf5a0de4d3752f35bda20b24c3263ce2cf051050bbaaeac8d3aabc175fbac767b27ca93cf4eab6c9c63df42353c5bb0e7fd2e4bfd541645f6800b45f2757c2c1e6e7608e65af7829b434235cb7671d813b122ff7c42f3ad172a3648c648619917ec0e646202f1b4359756eabeefe68a3bd70bbf4cd804324306f871555c106d5a8dd0f91806ed5f04481134168a0f29cae3027a850607512069a377096a4efcf8215bb77b69a0d41962a980bf68381bdaa64dcdb01ab781f39e354d770b2eba4465a35bb586a36d0724977beef449f554bbe3d46aad730b94dd1e8cc3d46dd331864324bdfb56063c4ddeb907646358aeaba50f376b59b833640e387d58896f03aaf456ffe167373ce650ae381cad4227479ecdbfe72e06b6abac145822bda23978d02fc85eaec4bc54a52bb90c70cf8260f53bd5763a967e747bbb263bad788a7e1ad10a141a471050c5b2d2e98cbb9f24b563b5f674c4daf8d4ab5f33dd3f35f6d18a36b82b2cb2f41efa3fdcb0a96ad117d0cdca76bafd815b447a50e4b89ed13bcc0d356cf0969e4707487a65b53e027f7b8ef35fa5a3de20d7cf24a5f91a2c3d4a61a02bb0238730d006a372095a87dc33a286e4a22d3d125cf0e9eeb61172676edd694627fa4d1ca48ade7229fa4e345b468c2e8d7bb6c136b5e4327a66eca2df83270c6161d739cd41b7702a9324427edde1e6c005f4d936b8d360ecad7b5ba645fcd20ca2294596d37e9074b5ef1c4f3a499a0d658714d785a35c78602ac92fbb12f0002dd45f4d392d3f1871311460a1d15f32f0b922998df68122358ba0eaf83f69d3d96d47dfff34f8e8cd44c34bc34564fa4f8b12b5a9add049b1400302ab08e9d0af0bbb20edb2f20a3f86fbed34d564a8575ec594e5ec432bd12574e71f7937032edcd38070d601ccb5cd1d2910137b638091e4397cb4968413b40b55c68685eaf8e603ec4e310cb9ba4d1bb98d554d32ea69cff718783c89e568ec3e46a44b2a498417c13ce7741a9d2d21b436d19b893ef2ce62009b3bdcb7db475c6223db32c58cfae7c0b51dfd5d795727e58a882ccb055e432790a4784bfeebcde88eb60032bf7588aee0ef3b92fb491bb0fd7ed5aad776bc91f228e4da694ad1d5edb691220cf303cbdf98a12453ff33cd3e1e84ed4c512321a6f0609eb465c25bf7d79b70cf622a0de14f3fcdda9ae85651f7ad47e7a5c53888a40c83c19bb32d3a7ca1d090394ad246eff781400db2f9d91f907c4b100343ab552b730fb6c44be3aa210cfc8a7e9166abc59cc6614a6d4a1fa577aa87f9bc1e4e9c4ac09e273d2a5a9bc45654c723097035b8d927b15c4b4b50e3cd9153102b7042a08bc74261b881f0370963ffc3d921a76afd39ba08bd6f38bb94c89212119012ebc8e93ef9a3d2322775fa06ec764079df2746c64fb1d98f00e664ba0c76be38298ab3c8d8013abba3fbe564f6999a0ef028328e54cd20e33d450c76728da700be0a5a1674f7257912b78bf19b142c23231eb4916df46b2257f343b8e80e4a0f9dd733726ad9af806c2709a2ea91d19394d13343a442c7ed905a062b0d6eddfcbb2970d0d5385ea9c68d7e7943c8fd69fba000c60cb737e228f577ceee3ecf50225a7fc8d5e9e94d74db98592072b3c65c97605895ab269ada2f9608651298d1514da15989c72df912cf8a773eb5071bd11e0c616ca214aa26d71c0e6503432175cbebc2ca361bea5c9eee8f060225afd9ac790c27c650d95efc9e49dc0704f2dcdfd449333fc09e058f25396823ee55d008e1f942650762c41bbf66cb72fa643dea8d1d4cc5acc27504c2a2fb192068754534412e1544251563f2fded33238f67ec5679329ff77a675506395df6a8342defbe90f81080546bd1298c8cd6e0d40e7a6b16b5392720af52db147e060b9778f50f190ce2f67a95ca7a21338f0a2d8270af1bc26a42fa9d05d2a51bfcaa60e7f44531de440e09713d4a107b6cbdd7c34681e6a3b35869ff2bf9339e86dff3a4218e4d06e47ed689c5feba0020e3528ac269cc407d36a75a4c59a3e9b44266bbec2607ab716465d0c894b2ffe2c19add6cc1299be943f53a6021ee5554fad471737ed5abe9d698356ca2222a5b2da8bf8060b4ffc1f76dd5d96b2fb087dca1b93e1a319342e548389d88e157b6b029167e202f23ad00cbb928d2d2603ba8b34d55abd968982680801657e2de6b6bd0f44c87a5f9a0157b2e8963b6d70eda9e8c91966f3691d8a31f2fe7285aee0993fd071ea834da42b7ca55e805f2dd40b00b4530aac89ec83807040ce78b2c3e25122cbdd72a479eaa767b2f60cadd8e0a45b50ef3e8f34d704f997c5532b30d586b321aca3903bd10c10d3ed524979fe0e677d7efeb0ee5a06d42d4e141d8866dcad7a3e916a674db0d8368d95bd1b47833ce060e0f085ac6f160776702c7a10d802cccfb300a1b3af35f31d88bfd4cbd3aee32dde0d3db7cfaa22f101d14a52d2ef13c44bf85275b73ddc5d2a4ee218a302fd90650166cc19d7bd1d04249592def6a879408b13c0817c314c7965ec2913722df9cd148473792c52747d5b36d2e7f3918660f8482732f7e956de4f40b357d6d58bf7c5a896477ccd34fcddbf1b76e60dad99ef72fee2234694f4c3933e99cef00611d3c3d16c379cca378fd417eaa88628d7075513d3cd9b6f800bb94b36a566ddbfc6e6cb41e69790ca3fe6cf5e6ac3e4193d06db4d555d2ca4bdae72b4829c302dac95828f1ea99cbbc157b9e5b519e8d29123f84f3385742e74d600f62d9f0a0dc1d210a9577b4ac68560f36f8d2e9c8784202f7dcc4158363bd2888f1d56e9b4f3e139c783d7fbd4539d51ff3ccc4d691394dca98e3e5bd96fd08594ebd3e33392e6ba1116287c5f39840bc4c99ec197396bdc71de71fcb8494a0050a056233156d271cc0ac7604aa67e9900e084c7b76254d8197b4b37c9cd087de91fe1ec44fe62cc7efc1a0cfc912acbab5ee12588163c85f4de2ec83c7aa7dbae588a27e2c844f687bab15b1060c625a57cd0e340e2e07e63f965c3cef21b09ed44651db2596f5e14394cc95636c8c890ff20c677c11e99b3d7220400b8e8ce9878d0b64d36c837cd4cc7e2db8456ee43256d1f7ed2d71228ed9e08ca90cd576e39bfc672bf14a3699001fe27f2572822c10a11ae87ab79775c4e88f79f66044fc07d6d2bbc5c2528159194836611593cb1c9f979f0c5ed499a712a454d52acb97cbbcafe576e9ab0d6dd527862d6ad330e2a644e9ae0969348a4bd397a810748a42a7fb21de6dbf27855e229335923031c700a24d30a81a7c02750201f725248e30e63d4f51923833b6c4c09141fdb6cfde32de5977319095a59445bdfaacdcea8ee4626eee3555db2fb32ecd20c85d157d2cab2f688c572b8062bc1fc8ada97d2769df7c55559abb66ee21e04c503fc7fcbc615fa81a256fe902a1896e9209e658b178c1f586515800c1fe1c0d35eb5a6256aa6c035ab5a14e1bca66fc2f0bc342b7ff341a4434ac4b8d6989fa8b700f56197cdc8d3e77105008209e13d8dce899ecad89552ed600eec18c7dd6ec46f12a596ab3297aa7a8641365131d8c5dcd8e2f6a50f72540bf2362ceb9c063761d2658e5c2150becd364b0cc74f62ccdad218382520aa8aed0f926a439a6ef0947641b104d34c63a833d08b1dfcbbe9405a0625fd060cd1057ebbfba4be70718f1431787668d1c2b2c29646bcda99b4c740e116bfcb52852f31d7b97ddfea6e976c6a867f92ca5434cfafb47b37d35d26287b0321856754cf3a1951d240968aba1c992e004c9e6ed5f6ee38b02782ae22dd6b10c577c7ff9e700a8cbc4362947e808a132dc8a54c4444494899899b81b73fcd0832eab6bc660c6ff11d6c95686d8d176c61d3c0083daf8886c9b4a895fb661214f13d26e821bdce56b8d2a9cd8dee50168bf72e06c58312edd1afac063d3fc8f2cd736965f641681dbaa8201cea4af860c97c219a42aafb01bdb8f475702199d84d70c5b94ecf3473fe1e77858de5e4c6bfd19a21e73c978a0aa99ebdb112e36d6e61f875783ac854f12e55f79a09548015c2f3556b77a80149f66a29ee4adf30cfe40382998f150fa89287cdc2f2a430b0a061e5ced3ef1133fee63313c2ec1ca4666dbccd89b1d8e8d55ad67a9732a0d62b060f14f78a3a704492de6ec97f6e23196f21a94243f84cd003eeac050a50a73990d05af8b4656b6610303c6dc7b101101d02ff3f76361ba60f6dd9890a80febaaf29756d3830eda7462c3be32b0f31b62d6bbeab92a68b8eb7a514c72c270e72df7de6b1e8e7eda1f248331806dc36e45c4487d1a2f4ada40e61ac63aa6eb3021ec479d7fe0e8c7d99dc5016c9eba16dc06b5ffb8093a06570f56ad2b866a0205837bf4e513d543bac460e2cafbc5c12befb30d3555e68786e0ecf56a88f9f050b72fbba701a86c9f332d07c00f98f8817ff48a2a4949e502dcbfc54d83b5220a2d1b8e49cdc5e0b5e619fdb2aca505a2b4ff4613e32aba2ef7baa5574f0f0f0c915f09e15ced4a3be9b3081bc30a6e3fc0c8dd0f22ef8e1b622f29f41f6d7f5db22e44088ffd2e684ca2e8d1cca1cf9bec00231b1324556d5a89da7f44644cc6552d1aef4f26dee033696548d2c05660f7f638ebe0a7083310149d5122b5bd0240261ade342ce0d3dd9837fd7f29fd5727eedf13ea52a503571c9be2c33a4db30a188d01a3c7d4926c5a17a6bdc596abe84d0e8c91b7b21e6066967822abe6275fd1be7824a4748fa6c5b7ce6a9a3c70879f58da50a10fd093a345f433bb38a18837e43c1260d147fab4e98497602086a02b464d72ac2a6e6de7cc8dcc976b12359a943a3614d93c59eec952c26ab17d9f1a1ed579afbd690ec4683a2ea9beb7c128c8ceb48dc4a5fa18d8ec2e251e866424fb8f206fd2a9b58a58401d2f29939688336d13c25630ba46dd2cf10dbda7774b2f94f319159b447bdd3bdcc6b7ddf8d94f142e5312b89e96a8ac398adb18933db8386dcc7c8c57ecdc9f463580c752476eec92f4e03619fcac9433544cbf2ce45a5a53013d1fce9df8dd07f2b30a6cc77a256a90b3b8172df906f2e44c1de2fe1ff0635e28cb7ff4eabfa6a97099334f10819b6c2c14e21ea9577b4e1eccd34a9ad8e0dd8ffee0e3388a4f51c8344ef2bde7592ab02463c533a3b792010cf9f5521376fca1b752c0ff806fd7820cce3dab37364a85b8336f446b47e37371d82552ad743c6bd883070a5fccc46044f9940f32bacd5a71c9f18f640fefc5ae7ade6e1ea54c14b582ff8361d61e75d5b62fdbfd279d0f15d6cd5a57e915a0a98810b27ca6f8c522e07f9450e22317eab30594ed6ad3cf0bb5322e79d0e2796cdd4eed224ee8821a7333ede7ab48976c779d2f1525b808664f5ff8af99a47541803f4691dc1100425543f0bc01b2b1fedd60ecea47817979b2a77fb58ec79eaf0a8fe28d59cffe1e31f19d4d6b3faaa14b0ded5f27423e6c24d53dbd7ffd0a788f7c3b013893af4c398f6fcc0d38405ee2fe18cf05c1a15d9718e0b7a44cb8e0131e06983a0e3e1740ffa7f6edf5451b157706f5db5b8f1e117a67bd5606737a59dcca3ceef868e62ed9e767173e0ac34386ad7741f8cc02ae4ac574f9f934f7e4427e5fd3baadee151fe5b32f48914de65f0a707f86840f7a6c742ad1f6a525f10c7d5ea951fb6cfd934b26ff5437d6442c5ae88170251f01b9d266cba3a0b704c1eb1e8d184cddc01d7c4d139faa4a95960", 0x1000}], 0x4) getdents64(r3, &(0x7f0000000080)=""/64, 0x40) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x1a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:13:26 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004) 12:13:26 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:13:26 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1916.235418][T19536] loop3: detected capacity change from 0 to 264192 [ 1916.237953][T19539] loop1: detected capacity change from 0 to 264192 [ 1916.258132][T19534] loop5: detected capacity change from 0 to 264192 [ 1916.285575][T19538] loop2: detected capacity change from 0 to 264192 12:13:27 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) 12:13:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1917.420987][T19552] loop3: detected capacity change from 0 to 264192 12:13:28 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) 12:13:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) [ 1918.167201][T19557] loop1: detected capacity change from 0 to 264192 12:13:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:28 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) [ 1918.776164][T19561] loop3: detected capacity change from 0 to 264192 [ 1918.859922][T19563] loop5: detected capacity change from 0 to 264192 [ 1920.163362][T19541] I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 12:13:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async) sendto(r1, &(0x7f0000000140), 0x0, 0x4000800, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async, rerun: 64) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (rerun: 64) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) (async) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') prlimit64(0x0, 0x5, &(0x7f0000000140)={0x10001, 0x20}, &(0x7f0000000180)) (async, rerun: 32) getdents(r3, 0x0, 0x0) (async, rerun: 32) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)="290d28e1a5894b17b4d34acbb89f96c649bc4bf2de7a02df899c823f0283fde2cf8f0f01970cc7ceb4b67858283a90c7a6c70444bc0034e8e6931b07d629a14d0c5c0d91c85989bfaf76f1043490e152b641d127ad3fd3bb9a2bc4960011b29fa2ef5f7659d5e5fbacb3999f44550366fbf9caab064ebdc064833862cb677208a991cd199e6b3c34fd1e3a5d67b3e7b4befdec342f4161fd76a7fe78685130bf5cd7131a6fbeb01d817dbe406711cd9961da2be26c620da5a35b78cf7174f730656edad1029dd486d81691", 0xcb}, {&(0x7f0000000380)="d5dd32057373bd82905ece4b3f7167837d1c93bc2696873b9494bb3ed9fa1f4d204a554b05de884fc645b300ec72519a4d0a7e1aa85db48c854c9e8c68b1e1bf9f0615a37f72b15b8d256c72c9f9a07ba6d8faae7eb0b8b014923afa3703a868e05a7b1110fb92b6078597e7", 0x6c}, {&(0x7f0000000400)="70b4ff9dea7eac697da1ebfacaf3a054e207197f6fbaecc6eee66326caec4f39bcccff2cc3bb933fb7a0fb88b680fdc0c8944dcb00146b576a2e9e5e1889b0147fb46db714ae359b8a63e4a2e86d76b3fdb2e038190fd6308e2172db39124c51c5adf079b80720900843bfccdf4624d84b176093ff5c", 0x76}, {&(0x7f0000000480)="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", 0x1000}], 0x4) getdents64(r3, &(0x7f0000000080)=""/64, 0x40) (async) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x1a) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:13:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:35 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) 12:13:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:13:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) [ 1925.436886][T19576] loop5: detected capacity change from 0 to 264192 [ 1925.440068][T19575] loop2: detected capacity change from 0 to 264192 [ 1925.452966][T19577] loop1: detected capacity change from 0 to 264192 [ 1925.456164][T19580] loop3: detected capacity change from 0 to 264192 12:13:36 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) sendfile(r0, r1, 0x0, 0xf03b2900) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000000000004) 12:13:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1926.775872][T19593] loop1: detected capacity change from 0 to 264192 12:13:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:37 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) sendfile(r0, r1, 0x0, 0xf03b2900) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000000000004) [ 1927.113556][T19596] loop3: detected capacity change from 0 to 264192 12:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:38 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) sendfile(r0, r1, 0x0, 0xf03b2900) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000000000004) [ 1928.128879][T19605] loop2: detected capacity change from 0 to 264192 [ 1928.563670][T19579] I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 12:13:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendto(r1, &(0x7f0000000140), 0x0, 0x4000800, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) (async) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') prlimit64(0x0, 0x5, &(0x7f0000000140)={0x10001, 0x20}, &(0x7f0000000180)) (async, rerun: 64) getdents(r3, 0x0, 0x0) (rerun: 64) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)="290d28e1a5894b17b4d34acbb89f96c649bc4bf2de7a02df899c823f0283fde2cf8f0f01970cc7ceb4b67858283a90c7a6c70444bc0034e8e6931b07d629a14d0c5c0d91c85989bfaf76f1043490e152b641d127ad3fd3bb9a2bc4960011b29fa2ef5f7659d5e5fbacb3999f44550366fbf9caab064ebdc064833862cb677208a991cd199e6b3c34fd1e3a5d67b3e7b4befdec342f4161fd76a7fe78685130bf5cd7131a6fbeb01d817dbe406711cd9961da2be26c620da5a35b78cf7174f730656edad1029dd486d81691", 0xcb}, {&(0x7f0000000380)="d5dd32057373bd82905ece4b3f7167837d1c93bc2696873b9494bb3ed9fa1f4d204a554b05de884fc645b300ec72519a4d0a7e1aa85db48c854c9e8c68b1e1bf9f0615a37f72b15b8d256c72c9f9a07ba6d8faae7eb0b8b014923afa3703a868e05a7b1110fb92b6078597e7", 0x6c}, {&(0x7f0000000400)="70b4ff9dea7eac697da1ebfacaf3a054e207197f6fbaecc6eee66326caec4f39bcccff2cc3bb933fb7a0fb88b680fdc0c8944dcb00146b576a2e9e5e1889b0147fb46db714ae359b8a63e4a2e86d76b3fdb2e038190fd6308e2172db39124c51c5adf079b80720900843bfccdf4624d84b176093ff5c", 0x76}, {&(0x7f0000000480)="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", 0x1000}], 0x4) (async) getdents64(r3, &(0x7f0000000080)=""/64, 0x40) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x1a) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:13:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:13:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:44 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x0) [ 1934.714715][T19620] loop1: detected capacity change from 0 to 264192 [ 1934.721245][T19619] loop5: detected capacity change from 0 to 264192 [ 1934.726026][T19617] loop2: detected capacity change from 0 to 264192 [ 1934.729653][T19621] loop3: detected capacity change from 0 to 264192 12:13:45 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x0) 12:13:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd04"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1936.120838][T19635] loop3: detected capacity change from 0 to 264192 [ 1936.185447][T19637] loop1: detected capacity change from 0 to 264192 12:13:46 executing program 0: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x0) 12:13:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:13:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd04"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1937.727840][T19647] loop3: detected capacity change from 0 to 264192 12:13:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1938.137150][T19623] I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 12:13:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = dup(r0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7f, 0x20, 0x0, 0x14, 0x0, 0x8, 0x0, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xb7}, 0x2000, 0x3, 0x8, 0x6, 0xe60e, 0xff, 0x3f, 0x0, 0x3, 0x0, 0x2}, r1, 0xb, r2, 0x8) 12:13:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:13:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd04"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1945.997682][T19662] loop2: detected capacity change from 0 to 264192 [ 1946.003845][T19659] loop1: detected capacity change from 0 to 264192 [ 1946.006873][T19663] loop5: detected capacity change from 0 to 264192 [ 1946.021100][T19661] loop3: detected capacity change from 0 to 264192 12:13:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) [ 1947.063324][T19675] loop1: detected capacity change from 0 to 264192 12:13:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a430000000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1947.198562][T19677] loop3: detected capacity change from 0 to 264192 12:13:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) [ 1948.030101][T19665] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1948.077335][T19681] loop1: detected capacity change from 0 to 264192 12:13:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:13:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd04"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:13:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a430000000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1949.060352][T19665] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1949.090527][T19684] loop1: detected capacity change from 0 to 264192 [ 1949.207489][T19687] loop5: detected capacity change from 0 to 264192 [ 1949.211018][T19688] loop3: detected capacity change from 0 to 264192 12:14:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = dup(r0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7f, 0x20, 0x0, 0x14, 0x0, 0x8, 0x0, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xb7}, 0x2000, 0x3, 0x8, 0x6, 0xe60e, 0xff, 0x3f, 0x0, 0x3, 0x0, 0x2}, r1, 0xb, r2, 0x8) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) (async) dup(r0) (async) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7f, 0x20, 0x0, 0x14, 0x0, 0x8, 0x0, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xb7}, 0x2000, 0x3, 0x8, 0x6, 0xe60e, 0xff, 0x3f, 0x0, 0x3, 0x0, 0x2}, r1, 0xb, r2, 0x8) (async) 12:14:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) getpgid(0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:14:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:14:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a430000000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1959.433148][T19698] loop1: detected capacity change from 0 to 264192 [ 1959.442173][T19702] loop2: detected capacity change from 0 to 264192 [ 1959.442301][T19700] loop5: detected capacity change from 0 to 264192 [ 1959.451251][T19701] loop3: detected capacity change from 0 to 264192 12:14:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 1960.363559][T19706] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1960.399560][T19714] loop1: detected capacity change from 0 to 264192 12:14:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socket$netlink(0x10, 0x3, 0xa) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:14:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/35], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1960.689258][T19719] loop3: detected capacity change from 0 to 264192 12:14:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/35], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1962.516313][T19729] loop3: detected capacity change from 0 to 264192 12:14:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = dup(r0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7f, 0x20, 0x0, 0x14, 0x0, 0x8, 0x0, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xb7}, 0x2000, 0x3, 0x8, 0x6, 0xe60e, 0xff, 0x3f, 0x0, 0x3, 0x0, 0x2}, r1, 0xb, r2, 0x8) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) (async) dup(r0) (async) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7f, 0x20, 0x0, 0x14, 0x0, 0x8, 0x0, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xb7}, 0x2000, 0x3, 0x8, 0x6, 0xe60e, 0xff, 0x3f, 0x0, 0x3, 0x0, 0x2}, r1, 0xb, r2, 0x8) (async) 12:14:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a430000000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:18 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/35], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1968.636463][T19739] loop5: detected capacity change from 0 to 264192 [ 1968.639129][T19738] loop2: detected capacity change from 0 to 264192 [ 1968.655495][T19741] loop3: detected capacity change from 0 to 264192 12:14:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/38], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 1969.850539][T19757] loop3: detected capacity change from 0 to 264192 12:14:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/35], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:21 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1971.191895][T19767] loop5: detected capacity change from 0 to 264192 12:14:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x14900, 0x29, 0x13}, 0x18) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0xf00, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffd9e9}, [@call={0x85, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x18, 0x3, 0x0, 0x2}, @generic={0x1, 0x9, 0x4, 0x401, 0xfffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x6, 0x9, 0x0, 0x18, 0x8}, @generic={0x0, 0x6, 0x9, 0x40, 0x4}]}, &(0x7f0000000280)='syzkaller\x00', 0x8001, 0xce, &(0x7f00000002c0)=""/206, 0x41000, 0x14, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xd, 0x4, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff]}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x10) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=@bridge_setlink={0x7c, 0x13, 0x400, 0x70bd27, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x10000, 0x20443}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_XDP={0x4c, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}, @IFLA_XDP_FD={0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x3}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r2}, @IFLA_XDP_FD={0x8, 0x1, r3}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x2}, @IFLA_XDP_FLAGS={0x8}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r4}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r5}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:14:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/38], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:28 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:14:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:28 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1977.993936][T19817] loop5: detected capacity change from 0 to 264192 [ 1977.995205][T19819] loop2: detected capacity change from 0 to 264192 [ 1978.020886][T19820] loop3: detected capacity change from 0 to 264192 12:14:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:29 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/38], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1979.152939][T19854] loop2: detected capacity change from 0 to 264192 [ 1979.221614][T19856] loop3: detected capacity change from 0 to 264192 12:14:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x14900, 0x29, 0x13}, 0x18) (async) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0xf00, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffd9e9}, [@call={0x85, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x18, 0x3, 0x0, 0x2}, @generic={0x1, 0x9, 0x4, 0x401, 0xfffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x6, 0x9, 0x0, 0x18, 0x8}, @generic={0x0, 0x6, 0x9, 0x40, 0x4}]}, &(0x7f0000000280)='syzkaller\x00', 0x8001, 0xce, &(0x7f00000002c0)=""/206, 0x41000, 0x14, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xd, 0x4, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff]}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r4}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x10) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=@bridge_setlink={0x7c, 0x13, 0x400, 0x70bd27, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x10000, 0x20443}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_XDP={0x4c, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}, @IFLA_XDP_FD={0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x3}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r2}, @IFLA_XDP_FD={0x8, 0x1, r3}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x2}, @IFLA_XDP_FLAGS={0x8}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r4}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r5}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:14:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/38], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/38], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/39], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/38], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1985.328798][T19875] loop3: detected capacity change from 0 to 264192 [ 1985.341168][T19882] loop2: detected capacity change from 0 to 264192 [ 1985.347946][T19880] loop5: detected capacity change from 0 to 264192 12:14:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/39], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1986.919864][T19894] loop3: detected capacity change from 0 to 264192 12:14:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/38], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/39], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1988.280669][T19904] loop3: detected capacity change from 0 to 264192 [ 1988.340613][T19906] loop5: detected capacity change from 0 to 264192 12:14:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x14900, 0x29, 0x13}, 0x18) (async, rerun: 32) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0xf00, 0x0) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffd9e9}, [@call={0x85, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x18, 0x3, 0x0, 0x2}, @generic={0x1, 0x9, 0x4, 0x401, 0xfffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x6, 0x9, 0x0, 0x18, 0x8}, @generic={0x0, 0x6, 0x9, 0x40, 0x4}]}, &(0x7f0000000280)='syzkaller\x00', 0x8001, 0xce, &(0x7f00000002c0)=""/206, 0x41000, 0x14, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xd, 0x4, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff]}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r4}, 0x10) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x10) (async) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=@bridge_setlink={0x7c, 0x13, 0x400, 0x70bd27, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x10000, 0x20443}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_XDP={0x4c, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}, @IFLA_XDP_FD={0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x3}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r2}, @IFLA_XDP_FD={0x8, 0x1, r3}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x2}, @IFLA_XDP_FLAGS={0x8}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r4}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r5}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:14:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/39], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1998.709668][T19916] loop3: detected capacity change from 0 to 264192 [ 1998.723504][T19922] loop2: detected capacity change from 0 to 264192 [ 1998.730814][T19921] loop5: detected capacity change from 0 to 264192 12:14:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:49 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:14:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 1999.999900][T19937] loop3: detected capacity change from 0 to 264192 12:14:50 executing program 1: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2001.127291][T19946] loop3: detected capacity change from 0 to 264192 12:14:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2001.372262][T19949] loop2: detected capacity change from 0 to 264192 12:14:58 executing program 4: sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x541c, &(0x7f0000000040)) 12:14:58 executing program 1: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/39], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:14:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2007.915655][T19962] loop3: detected capacity change from 0 to 264192 [ 2007.924974][T19961] loop2: detected capacity change from 0 to 264192 [ 2007.935527][T19958] loop5: detected capacity change from 0 to 264192 12:14:58 executing program 1: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:14:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2009.255207][T19976] loop3: detected capacity change from 0 to 264192 12:14:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:00 executing program 2: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2010.801160][T19989] loop3: detected capacity change from 0 to 264192 12:15:07 executing program 4: sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x541c, &(0x7f0000000040)) 12:15:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:15:07 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2900) sendfile(r2, r1, 0x0, 0x8000000000004) 12:15:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:15:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2017.206927][T19999] loop3: detected capacity change from 0 to 264192 [ 2017.215602][T20001] loop5: detected capacity change from 0 to 264192 [ 2017.232092][T20002] loop2: detected capacity change from 0 to 264192 12:15:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:08 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, 0x184, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)='veth1_to_batadv\x00'}) 12:15:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[], 0x80}}, 0x0) 12:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x2, &(0x7f0000000140)=@raw=[@btf_id], &(0x7f0000000180)='GPL\x00', 0x2, 0xf0, &(0x7f00000001c0)=""/240, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:15:08 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000002240)={0x0, 0x0, &(0x7f0000002200)={0x0, 0xffffffffffffffb0}}, 0x0) 12:15:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 12:15:15 executing program 4: sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x541c, &(0x7f0000000040)) 12:15:15 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:15:15 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast2}, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1=0xe0000002}, @timestamp_reply={0x11}}}}}, 0x0) 12:15:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x18, 0x2, &(0x7f0000001140)=@raw=[@initr0], &(0x7f0000001800)='syzkaller\x00', 0x10001, 0x95, &(0x7f0000001200)=""/149, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:15:15 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)={&(0x7f0000000840)='./file0/file0\x00'}, 0x10) 12:15:15 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200ae7080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f0000000980)=""/4091, 0xffb}, {&(0x7f00000019c0)=""/4091, 0xffb}], 0x3}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="ff0f4000", @ANYRES16=0x0, @ANYBLOB="012656c99f43bbfee3", @ANYRES32=0x0, @ANYBLOB='T\x00\n'], 0x34}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="584c1b5caa01", 0x6, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='\t', 0xad2a, 0x7802, 0x0, 0x4b6ae4f95a5de318) 12:15:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001d40)={0x0}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) [ 2025.687253][T20079] loop3: detected capacity change from 0 to 264192 12:15:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x2, &(0x7f00000000c0)=@raw=[@ldst={0x3, 0x0, 0x6}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000200)='GPL\x00', 0x2, 0xf2, &(0x7f0000000240)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:15:15 executing program 2: r0 = socket(0xa, 0x3, 0x9) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x805) [ 2025.735355][T20082] netlink: 'syz-executor.5': attribute type 58 has an invalid length. [ 2025.743629][T20082] netlink: 32697 bytes leftover after parsing attributes in process `syz-executor.5'. 12:15:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x15, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd]}, &(0x7f0000000200)='GPL\x00', 0x2, 0xf2, &(0x7f0000000100)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:15:16 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200ae7080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f0000000980)=""/4091, 0xffb}, {&(0x7f00000019c0)=""/4091, 0xffb}], 0x3}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="ff0f4000", @ANYRES16=0x0, @ANYBLOB="012656c99f43bbfee3", @ANYRES32=0x0, @ANYBLOB='T\x00\n'], 0x34}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="584c1b5caa01", 0x6, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='\t', 0xad2a, 0x7802, 0x0, 0x4b6ae4f95a5de318) [ 2025.863487][T20095] netlink: 'syz-executor.5': attribute type 58 has an invalid length. [ 2025.871683][T20095] netlink: 32697 bytes leftover after parsing attributes in process `syz-executor.5'. 12:15:22 executing program 4: prlimit64(0x0, 0xc, &(0x7f00000000c0)={0x2b, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1a) 12:15:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 12:15:22 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200ae7080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f0000000980)=""/4091, 0xffb}, {&(0x7f00000019c0)=""/4091, 0xffb}], 0x3}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="ff0f4000", @ANYRES16=0x0, @ANYBLOB="012656c99f43bbfee3", @ANYRES32=0x0, @ANYBLOB='T\x00\n'], 0x34}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="584c1b5caa01", 0x6, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='\t', 0xad2a, 0x7802, 0x0, 0x4b6ae4f95a5de318) 12:15:22 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_int(r0, 0xffff, 0x800, 0x0, 0x0) 12:15:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:15:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=@in6={0x18, 0x3}, 0xc) 12:15:23 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @broadcast, @val, {@ipv4}}, 0x0) 12:15:23 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200ae7080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f0000000980)=""/4091, 0xffb}, {&(0x7f00000019c0)=""/4091, 0xffb}], 0x3}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="ff0f4000", @ANYRES16=0x0, @ANYBLOB="012656c99f43bbfee3", @ANYRES32=0x0, @ANYBLOB='T\x00\n'], 0x34}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="584c1b5caa01", 0x6, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='\t', 0xad2a, 0x7802, 0x0, 0x4b6ae4f95a5de318) 12:15:23 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) [ 2032.804092][T20107] loop3: detected capacity change from 0 to 264192 [ 2032.813262][T20102] netlink: 'syz-executor.5': attribute type 58 has an invalid length. [ 2032.821560][T20102] netlink: 32697 bytes leftover after parsing attributes in process `syz-executor.5'. 12:15:23 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x1}, 0x8) 12:15:23 executing program 0: r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x1}, 0x1c) [ 2032.884928][T20112] netlink: 'syz-executor.5': attribute type 58 has an invalid length. [ 2032.893324][T20112] netlink: 32697 bytes leftover after parsing attributes in process `syz-executor.5'. 12:15:30 executing program 4: prlimit64(0x0, 0xc, &(0x7f00000000c0)={0x2b, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1a) 12:15:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x40004, 0x4) 12:15:30 executing program 0: setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0xea60}}, 0x0) 12:15:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:15:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x80000000}, 0x14) 12:15:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000540)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@prinfo={0x14}], 0x14}, 0x105) 12:15:30 executing program 2: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 12:15:30 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', r1, 0x29, 0x3, 0x40, 0x8, 0x60, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x20, 0x8, 0xff, 0x1}}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x9a, 0x8, 0x1f, 0x8000}, {0x7, 0x7, 0x0, 0x4}, {0xfff, 0x5, 0x8, 0x2}, {0x5, 0x9, 0x0, 0x2}, {0x1, 0x4, 0x2, 0x38c}, {0x1, 0x2, 0x30}, {0x6, 0x1f, 0x20, 0x18000}, {0x1, 0x4, 0x0, 0x9}]}, 0x10) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000001c0)={0x21}) write$ppp(r0, &(0x7f0000000200)="4d6af1e96ec87aa3eadeb0ceed8974ed56f6db68afb3960a0e57e52ba4a6d7f159c4371140b47e9d3acf7eaf0f3178e85eacbe1e8fe4330639cc78d96ec66be17f33ff498ab216bc3f68443c1ba85b34fbf7d8f626cef63d4ffdaa9901a38f151b908acaa8894d3206229c245af022743a2b03bffeb60709896511c0bf23d36de7c9f8ce9999e162014346ae5ed1d4b4c4643b21832c67b2cb0d615c1ab900e032223bc0aa78e4a6f7a3a7c150094ea6c20cd57591041e6d121d3447fc21015ff47a8b45edefc7b940ed1c8936d39577a266b6e92407282e0c62d14271f5df41e91367ad35b42bac262fcd3cb53141362d", 0xf1) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f00000003c0)={'ip6tnl0\x00', &(0x7f0000000340)={'sit0\x00', r1, 0x0, 0xf9, 0x2, 0x8, 0x40, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7800, 0xa0, 0x40, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000400)={'ip6gre0\x00', r2, 0x2f, 0x81, 0x5, 0x4, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x8, 0x700, 0x9, 0x1}}) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000004c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000700)={0xfb, 0x3}) 12:15:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000680), 0xc) [ 2039.919806][T20134] loop3: detected capacity change from 0 to 264192 12:15:30 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0x0, 0x0}) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000130009006900000000000000ab008000200000004600010707000014190001001000000800005068230000000000ef38bf461e59d7", 0x39}], 0x1) 12:15:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0x2, &(0x7f0000000300)={{}, 'port0\x00'}) [ 2039.970917][ T24] audit: type=1400 audit(1645013730.156:377): avc: denied { bind } for pid=20143 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 12:15:39 executing program 0: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), 0xffffffffffffffff) 12:15:39 executing program 4: prlimit64(0x0, 0xc, &(0x7f00000000c0)={0x2b, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1a) 12:15:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000140), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:15:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001100)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000100)) 12:15:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:15:39 executing program 2: pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x10000}, 0x0, 0x0) 12:15:39 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000100)={{0x1f}, 'port1\x00'}) 12:15:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="94000000", @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="78003300800000000802110000000802110000005050505050500000e2ff00000000000000427a26504af963e5f6b0eda126f60a416f020000050300000025030000002a01003c04000000002d1a000000000000000000000000000000000000f3420000000000e2f88f7fc25cf7bdc11f2225716611"], 0x94}}, 0x0) 12:15:39 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f0000001180), 0x42001) [ 2049.126900][T20165] loop3: detected capacity change from 0 to 264192 12:15:39 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "81611e49606329d144589d883d037b02fe49408c6d3b5584b4192d325c07862013818c64813a41a4eefdabbb6ae33a12bac7b9b06f7a25f0d26a8d0b91229f16"}, 0x48, 0xfffffffffffffffd) 12:15:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000002c000100"/20, @ANYRES32, @ANYBLOB="000000cc000010000000f1"], 0x34}}, 0x0) [ 2049.248249][T20187] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 12:15:48 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)={0x0, 0xfb, 0xfbd, 0x0, 0x0, "c670058726edd0b21ee0bb548a894386", "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"}, 0xfbd, 0x0) 12:15:48 executing program 5: sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, 0x0, 0x0) 12:15:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:48 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001340)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x6e6bbc, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@dev}}]}, 0x50}}, 0x0) 12:15:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:15:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x4e5b2ca}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000280)="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") 12:15:48 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) 12:15:48 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') 12:15:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffefff}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xe8, &(0x7f0000000180)=""/232, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:15:48 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={r0, 0x0, 0x1, 0x0, &(0x7f0000000780)=[0x0], 0x1}, 0x20) 12:15:48 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_type(r0, 0x0, 0x0) [ 2058.409345][T20202] loop3: detected capacity change from 0 to 264192 12:15:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) 12:15:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:15:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:15:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 12:15:49 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000080)="072b142a85", 0x5, 0xfffffffffffffffb}, {&(0x7f0000000180)='\\', 0x1, 0x1000}, {&(0x7f0000000200)="8b", 0x1, 0x9}, {&(0x7f0000000280)='?', 0x1}, {&(0x7f0000000340)="d50c", 0x2, 0xfff}], 0x0, 0x0) 12:15:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x4e5b2ca}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000280)="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") prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x4e5b2ca}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') (async) getdents(r1, 0x0, 0x0) (async) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) (async) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000280)="a0e3d5c80f083d25f6ff2c7c36ac08982f739b7c1e45ad0ea19211a41bf0869311a6b6b4ba96432826b2cbab4f917d98461f9e13e373ffe85b6073624031c61c8a4a97488b2daddeed7838bbf787f69f61757d0365270aa8ae8a209bc155594b9dd4f68c9114a9c08de825aa6140bc5a2de1109213952d11570ba0a7cd5ac040560c98b563350cf35932820a4b6d878b8fc39f43125d48f0a233e3b13c79343b1468ac3bc60dca692822f58b6ab73216d31513b8adceef901feb470c855d23b074dffdc6768981c5fbe7fa1f4c51746576be0c0f2abc19e5e8f39e855816ddd30577de987c2a1491a7276a6c7660e13ff408cc6bbcd0f897e6861a96d5e17254cc57e06953eed180a98f1e45b3ff67df4e6309a7909bf91c85b2872fce79fa75cf8488ca243c981b10fb31e4ffc3639f04c18ad963d091fca7e2e8db2b937f22c2a0afee5c8066d7c138575cb8e90494d2240151e03b5f3d21775812d68968d9f328b97d14abf38ad06f24b023bd0a80cc9c1b723152cd47fef55957e06dbb998b167e5e1b970a0c190aa13cad07977b73663bfcca5c30a998da70cb17b462e6c6ea3844577701713345eb1efd696f145167bc44096998fd1c5d805151c081ecb657d5c6c5fa4ee446b7ec33ccdc9455cd4f54e25781f689a121a6f71f84bb4bd93e8b3e855563a664559f2367a0f905e9b51b9725b1af17bd9d5c31d340f659db2b3a61719e90d4b63617326acb30aeb01ed318d5378770cc4c8626b6d30a266190982f0afd5799d2478c19485a55b5e0d116862fb43c2e22a85aa654ffc75ee30f62e86fb254df3db59bc5814552259d7f4c4dd9fec2ce2972b4f6d153fea477a8ed11591e61553c4ef48fbedf21974d8ea5d8c3c2ba951ce2133fa1a9511c278351d609747af3facaa1a8e85e0501b92a2a62d11b80656c8d6ce26e732421c50bafc62a783b1d21d19667530e54c35c43ed9e6b611fb0fb54e0ad7356b40de848f44e58b22a25e64207e1920e1bafcec6eae85cf30ca6f0e65eb98d8c1cea626505b71763754fbc232bf265a60f4b0f79829e9bcd4606d94806dc9d9cdb0d6e95f0e1a4ef1bd83ab229c6e80657ca6eeee4e830612eafc0fd439d908e7ca58eaee449a157fc8357c76bd3772b3880e46d9fc2ec24e2408d70cde530262e5a2cbf6a92b14345e4568d15d006353fbc67af7b1fb8674a3b65574b70a7f4991e7d7de9a03cab7f6c5d48b868f538324c0881507dac533ae707c47ec208b955f11bd559c9145bddcb904dc71302044955ddb25cb4a69a7022d6e3a5cd3c6880c8a1681886e238f2429ec4ea24cc7208f745c75d8f0289b55c947ae36cf1bce848ec15c1024a5febf0201f05036a7ed781a904ba25a125fa291b3f9ae84e4da7a6c64c25057f670025b192230bc1240890519d61cf14480d0d292cef42a6c78dd53547bdda169d3f794bc56603450cb02d752bd9f94b3ded3735ba047a866af20d2143b5a9e27e457466ac300f7a24e449f4e2903ccb97e09ea4febe8b57337612be70ab24184fca47952c943485292b170f48568f44615b0281b2bee811fc8f1ae7a111edbd493b00717d8ab63cd8a2493c5096bed8c31b4cb8e46e6f3c005e93dca0b05b7b04ed0d2f94dec71d5e6e35c2325c887d518a0074ebf31b12c9622c65409acc67fb79aed871a927128e8d1e47eeb5f285a4061cb552babb77ca1680a033d8b7ad64def2ab8909a24c125435d792ee84c405f408d2335fa6adbc9afe04fadac39a1c19f5f3bce88346544e60d1f0aff62000cc6cb31d74917fe646ce9c00648b484f652fdebf944351fb8be91923e6293b354e3acd2b72da5afa199875697932ac7662d37a3d9c9688a119c1d40b2b129def25365bc566be9c960f46aefa9aa8a040e79dc1cff02432677e858c410e47f25e55a4909c0831d060379aad0029fb7f603995b5aa78a6ee68c7fd09cb89414eecf9fcfeb51a1a44b87d31f7219a3816d447731324b8e69a758042007c639c7f5e457a7dfc790eed4cb89bf42dc40dccc335e08d89bbf9515185c9dce05f5333b137df0624e2501babac0b9c318ef19e041064646dbab0f4a9161f01f1b1850be84be5b7294b125ba103700a305c02e0a2d08555994662aaf61177b061af815e0a3eefd8988a25ebc71df0c9ea77912e13426a309d42400487de8c95f9906614fdacfaa9c22c86ff394478ffda25318827266e5ad32edd59317bc39d308e1a58a79f7d121425ebe43048e00ef911ab799d15d6c87fd128e3a52760e410c9aef0ad4d10cab11297ebbf3db4cd491b24e432d8a069f79f4e3e808dacc587fa75386c986f50b924ff10e176e841bf756cc0946160a82fc4953f28027214885d65d0f773eb71d2b0101911873eb2aca07cec4aa5daa71230fe371863c8e44bbd096f28c5b6924b71cdf6e06c6d6beecd1d9c6fb2a95c90da1e29bef5e95b33ef66b5ba50c948d3dcf6b0523cf3bfb24c2c89f8f57b7a95f06970cad6c6a267b9d9546aa2447048b5582c0d2377b74a2d167dd7b9176181bf9cb379e665de7fddfc363530f7bdeb58b90a1b077ebf6eb13dcaf3f05783b3647898546f1b0aed5fea367d2ff8a1b979dc99f32f7fbe78f32836719c923afb976c3f33901ad0bdf032ab460ac8f43c10500e2973c361499c12fe56dc2cd05ff4649277a956d8b473565a336ca6ccdcd1f948571902153eb9a6ec9b3f12adec50ada12aa34bf46dd1135ce6cabc250eed602b4e6fb06cae31fea5b79434bb62f6e27798961480c1f393da42ee3677b043015f6eb211c80e463c69a8bd7b600bf26035bdde7539f5301c0a966bb05e77ab1fd7a6efed0af56b053bfd2e64ed01b9766b31953d6f234fcc8ace727278f3a3deb52966caf46775869d894b2fcd2c4207aab1d7ff58179e61c8b5b6bf3b43d2db48608482966d717c0047999464789c4c63213a096f70f3bc2516d9a781cfc5c0199cc47a4c66f03f8c06028492e81c23d2ab6bdfe16df951337560752bc42083345d235904474f1f46edb13b65367c15d8ecb509bdf1afb110aa5086eefde5f49ed6efa831fee5fb7e80a1c779fab92a2bc31bb632a459114e8b185227d2d834ddea0ab14506184bb171bc933bf636d10653af54c1365d22acf3c85ee6cdf9e2a2b44c645e9be6d8c5b3e2582d16fe8181ec1b7798c3837fa801180e34850b0342aca62034ae62f0b16bf614df220cea48d9190375685b3bfdaee89f379d11d287f36f48e9109f3b1630a91a84a8f2daf619f14b16b170e4ae6340dd7b3ff939e8161f43ee26353bd07b5e13501562fb993d49dfb585d427365110e267406f4d9fa015fabbbc9d7db41a92533c7238368bf06367e1054044aa2e4b73cd47414831f623232a0e847729ed8cc2f7eb60d4fc1ac202d9e243855476e56e26bdf08730e06a75786e2f7aa40002d43953767e480df2f99690e81b78ad794381f2d7521e5a43d92f26cd9083ea1e534dbe3f18676e04da6f3539c491bb39b0cf4c4745fa7917109d5d485c78891f98bddb328c594b0b2518d1f2410b325aae34fe1047d99aef31b6526a6f1ae814c5fb8533ac2de5f89b8d06c2bed67c281b23cd833838b88986b2a76600f291e3a3012d80886a1e07f00adda47a7d056620cac8a95149a92aba595cedda8d6cdea1e96ea02ff6c68c58381e433fd13c2bbc8afb3539a2892a54d5208b0f2464b5fee321b7db7e35dd851d0b88274b278d0a47df50ed5ff2bb57ce568cddcef55e199f104eebfa08f67b3ac96f4d2cdfacc705c9c6a835809c586f4a5e44cced0b49e6c30a54a96beadae56c2a54917ea883a3ff14901b0d873e5f86cf75227b320b2b9d16aafe893a254728780105e4604a176e4273758bc80922be5580b242f79fe74c621f31b083d4014d0e5806c90f0e96a2cfd06348f43c23fecd70c1acf9d3a9ee293b0bf45122d51064b8fb323a3b98d3ba119637963da2a651732f930f64125a9e898be70c4abc10c913f4bbefc971fb10223db782658bf1b56a2d605e9437c94a2b3e6521c37ddddb96dca67a1227f471e2dc9de7c1079a0ef4aac8510bdf96e57d12bc8ca0bc315c89be0c04ed9cf4f33fcfee7dc795bd469f58f54112b33aba4706513dd1093f3a3a400fd3da5899493602194ce4a2700440c88af3fddd67c560e67e6052de43719495ddcf738a5610a9f4be65a59682e9df6f24d1e5f5db36a0807e746844a0cb7aa46dee00536de548a021ad6533cca0a2ee92a6573578433e8e388da1eb6644a9f697b01d5dd7d492009c25fb4331c7b359099e49620c2018dd55428bcc0c19451e3bf07ac6804047964fce8048a3a0e7a3198588fad8eb22809b120673dc6be32f6944dfb1599f9903a2f8aaa8056c429c1353ada5a487696e48dc9b377d32c19c880f9293481023c62e96d815e84cf67ff06b75985aa19ec7d43974c7ca58e571d3e374d963cf1e369c423f4723324f1aa2b0061a1c7d5e5ed6de88a43a37c4a4bf150cdb5d8b04f0300c972ef719c8a61eb0bc48f9c940fd8f728402e5afd67df4477df813a168e910d336736a5395f94bdbb29442318fded24383b01faa3507fd2e19c445c995933cd642bfd07d9a6f03878e11a158df51969ce82ea319cc829b5aab21fc2178bf2a90fceb4aaa119602e197e1672c7dfdea770b686e865931028c4149769c3c256494a1119c813cc151461b17dd2a3fd1d07415a9c1a5a6cb03649df73c4c60ad48a435c4c85c1d2526082c2c1379d1498777faf7b75e730cac22ea4f7474eab26284009904edf46e965cb880bc841b1818506ce87aa04829b92c0448526c38d65e12db1b193d88798037f6ce77ed5b0642e7ff501136260a0a6c22012b3fba16e13c69795aa4652402534dd52588ca6912f48a740a8df66e2131d8b1b9dba5dde450791f11da5a9ece002714de90b32475b18f67cff312a2fd3878a78881007d5c99d940f7be022a4910e1537f8ccfe7d00ddf82fa0abea942dde0285ad85bf89d7a3f5833e4e25775983713e75c07f7207c6f405dde40ee66756cedf211203b63900d8d514df67d03e7821d7f171dba9acdd841dd1625aaaf529988fd25cb607e36a7e14a639338715b99153a7bda983bea909b087253b5d644650300a5796d6e83ba2bbf6ab87dabf584f6708d5140f4ee510cb34a0c2f5e102239c1041a6ae699991088614362ae4226dd3375ecd3e96486b786fc6df1be60e84f6d10f1fefeed8f05bd54d2395eb711c68994ad03f37c74e7ab1c40ed3395e695e6494ff800ea0972c0000ce7da96c9325258a37a1759184478f74b2d8243d98ae3fdc64f67b5f8b3991f0eb45304539424e6e0d75ce43e1378bb62c14055ec3fdf847d00f3683cd69cc2b1dc5aff25d9f19ad6ea6a217c24070962d69ff2914ab44f4518ca56efda93f2d88cca1909ae1f81eff27ee6412c388655f3ac1cacc8e615aa5991dd8ca8bf778628313e633be1dc7661fd66644bfb16e52f921d7c9536b33a052937d6da461a0955966e26cd307da364e47aeb28b1199cba09ed3ffa93acb3b6d496ffee8def0b5d767a28006401d5ebdffc435ab52e2c47c64c3a6329942235771e294e13a42294faea8cfbc83e5a7875f9e4476431607e5c4807863b73471087f41678d49f8ad749ec16a31a026167486cd283120929c613dedf1c9f8a2e028cf27431810070cc65781250783f03093767060ae9c02a182176057ed4defdc114c55e99b7dde065158d2b11c8a9ee8ff47ddc46649230d30e32b1dfb59778bb3ae440") (async) 12:15:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x203, 0x40002) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f00000005c0)=@usbdevfs_connect={0x8}) 12:15:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:15:55 executing program 5: bpf$BPF_LINK_CREATE(0x8, 0x0, 0xd) r0 = getpgid(0x0) rt_tgsigqueueinfo(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_clone3(&(0x7f0000000300)={0x40000000, 0x0, 0x0, 0x0, {0x13}, &(0x7f00000000c0)=""/232, 0xe8, &(0x7f00000001c0)=""/175, 0x0}, 0x58) openat$cgroup_pressure(r1, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 12:15:55 executing program 0: getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), 0x0) 12:15:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:15:55 executing program 0: syz_clone(0x60021000, 0x0, 0x0, 0x0, 0x0, 0x0) 12:15:55 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000040)) [ 2065.523500][T20234] loop3: detected capacity change from 0 to 264192 12:15:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@gettfilter={0x24, 0x1e, 0x1}, 0x24}}, 0x0) 12:15:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_getnexthop={0x20, 0x6a, 0x373232c3f86c3c37, 0x0, 0x0, {}, [@NHA_ID={0x8}]}, 0x20}}, 0x0) 12:15:55 executing program 0: bpf$PROG_LOAD(0x4, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa4040001}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@newlinkprop={0x44, 0x6c, 0x10, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x800, 0x20}, [@IFLA_EVENT={0x8, 0x2c, 0x101}, @IFLA_IFNAME={0x14, 0x3, 'bridge_slave_1\x00'}, @IFLA_MTU={0x8, 0x4, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x20000845) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 12:15:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@gettfilter={0x24, 0x12, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) [ 2065.664497][T20251] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2065.733215][T20258] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 12:16:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x4e5b2ca}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000280)="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") prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x4e5b2ca}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') (async) getdents(r1, 0x0, 0x0) (async) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) (async) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000280)="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") (async) 12:16:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@deltfilter={0x24, 0x2d, 0x1bdf59fe9ad791ad, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xb}}}, 0x24}}, 0x0) 12:16:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:16:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="04050000160001c3"], 0x504}}, 0x0) 12:16:02 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 12:16:02 executing program 5: syz_clone(0x6b100, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 12:16:02 executing program 0: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f0000000000)) 12:16:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@deltfilter={0x30, 0x2d, 0x1bdf59fe9ad791ad, 0x0, 0x0, {}, [@filter_kind_options=@f_bpf={{0x8}, {0x4}}]}, 0x30}}, 0x0) 12:16:02 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='\'/.:\xef.#(\xe1$\x00', &(0x7f0000000180)='\xc6E\n\x06F*\xcb\xbdR\x94Jm\xf3\xd2\xcc\xaa\xba\x9evN\xca\x9b\xc6D\xe4\xfc(\xe6rb\x11&Te\x85\x94\xa9F\x01\xefm\xc1\a\xd2\xfa\x1a\x14\x04\xe6\x15=\xf6u\xb6\xa4\xfb\x14\x06\x01\xa6\x91\xce\b\xff\xcf\x89-3\xb8\xd1|\x14\xb6[uk`\"g\x90\x93&kfT\xbd\xd2\xe5\a\xa67\x044\xe4\x02\x1b:\xbfe\x82\x9e\xaf\x1c\x88\xb4\x98\x83F~R\xb8\xd6J \x9dS\xceZ\xbd\xa2\xfc\xab!\x95\xc3`\xfa\xbaGK\x96\xc6\\$v\xe5\xfb\x1a\xddT\x9d\a\xcb\xce\x06\xed\x8b4\xf16&\x9b\x839|\x1d\xa62^\xca\x17_N\xe0\xa4\a', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) [ 2072.645636][T20265] loop3: detected capacity change from 0 to 264192 12:16:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 12:16:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0x0) [ 2072.727618][T20282] devpts: called with bogus options [ 2072.737222][ T24] audit: type=1400 audit(1645013762.916:378): avc: denied { mount } for pid=20281 comm="syz-executor.0" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 12:16:07 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='\'/.:\xef.#(\xe1$\x00', &(0x7f0000000180)='\xc6E\n\x06F*\xcb\xbdR\x94Jm\xf3\xd2\xcc\xaa\xba\x9evN\xca\x9b\xc6D\xe4\xfc(\xe6rb\x11&Te\x85\x94\xa9F\x01\xefm\xc1\a\xd2\xfa\x1a\x14\x04\xe6\x15=\xf6u\xb6\xa4\xfb\x14\x06\x01\xa6\x91\xce\b\xff\xcf\x89-3\xb8\xd1|\x14\xb6[uk`\"g\x90\x93&kfT\xbd\xd2\xe5\a\xa67\x044\xe4\x02\x1b:\xbfe\x82\x9e\xaf\x1c\x88\xb4\x98\x83F~R\xb8\xd6J \x9dS\xceZ\xbd\xa2\xfc\xab!\x95\xc3`\xfa\xbaGK\x96\xc6\\$v\xe5\xfb\x1a\xddT\x9d\a\xcb\xce\x06\xed\x8b4\xf16&\x9b\x839|\x1d\xa62^\xca\x17_N\xe0\xa4\a', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 12:16:07 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, 0x0, 0x0) 12:16:07 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getpeername$inet6(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@dev={0xfe, 0x80, '\x00', 0x22}, @mcast1, @mcast1, 0x2, 0x7, 0x1, 0x100, 0xbdb, 0x1c30090, r2}) 12:16:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:16:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) setrlimit(0x4, &(0x7f0000000040)={0x3, 0x7ff}) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x4, 0xdd, 0x5, 0x0, 0x100000000, 0x10, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xed6, 0x4, @perf_bp={&(0x7f0000000100), 0xd}, 0x4000, 0x2, 0x3ba3, 0x1, 0x877f, 0x6, 0x1000, 0x0, 0x6, 0x0, 0x8}, r0, 0x0, r1, 0x9) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000240)=0x11) getrlimit(0x7, &(0x7f0000000080)) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:16:07 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/195, 0xc3) 12:16:07 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='\'/.:\xef.#(\xe1$\x00', &(0x7f0000000180)='\xc6E\n\x06F*\xcb\xbdR\x94Jm\xf3\xd2\xcc\xaa\xba\x9evN\xca\x9b\xc6D\xe4\xfc(\xe6rb\x11&Te\x85\x94\xa9F\x01\xefm\xc1\a\xd2\xfa\x1a\x14\x04\xe6\x15=\xf6u\xb6\xa4\xfb\x14\x06\x01\xa6\x91\xce\b\xff\xcf\x89-3\xb8\xd1|\x14\xb6[uk`\"g\x90\x93&kfT\xbd\xd2\xe5\a\xa67\x044\xe4\x02\x1b:\xbfe\x82\x9e\xaf\x1c\x88\xb4\x98\x83F~R\xb8\xd6J \x9dS\xceZ\xbd\xa2\xfc\xab!\x95\xc3`\xfa\xbaGK\x96\xc6\\$v\xe5\xfb\x1a\xddT\x9d\a\xcb\xce\x06\xed\x8b4\xf16&\x9b\x839|\x1d\xa62^\xca\x17_N\xe0\xa4\a', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 12:16:07 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 12:16:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x14, 0x0, &(0x7f0000000040)) [ 2076.965664][T20297] devpts: called with bogus options [ 2076.979089][T20296] loop3: detected capacity change from 0 to 264192 12:16:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000000)=0x244, 0x4) 12:16:07 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='\'/.:\xef.#(\xe1$\x00', &(0x7f0000000180)='\xc6E\n\x06F*\xcb\xbdR\x94Jm\xf3\xd2\xcc\xaa\xba\x9evN\xca\x9b\xc6D\xe4\xfc(\xe6rb\x11&Te\x85\x94\xa9F\x01\xefm\xc1\a\xd2\xfa\x1a\x14\x04\xe6\x15=\xf6u\xb6\xa4\xfb\x14\x06\x01\xa6\x91\xce\b\xff\xcf\x89-3\xb8\xd1|\x14\xb6[uk`\"g\x90\x93&kfT\xbd\xd2\xe5\a\xa67\x044\xe4\x02\x1b:\xbfe\x82\x9e\xaf\x1c\x88\xb4\x98\x83F~R\xb8\xd6J \x9dS\xceZ\xbd\xa2\xfc\xab!\x95\xc3`\xfa\xbaGK\x96\xc6\\$v\xe5\xfb\x1a\xddT\x9d\a\xcb\xce\x06\xed\x8b4\xf16&\x9b\x839|\x1d\xa62^\xca\x17_N\xe0\xa4\a', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 12:16:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@base={0x5, 0x0, 0x0, 0x0, 0x20, 0x1}, 0x48) [ 2077.033574][T20307] devpts: called with bogus options 12:16:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 12:16:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) [ 2077.081012][T20315] devpts: called with bogus options 12:16:07 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 2077.393418][ T24] audit: type=1400 audit(1645013767.586:379): avc: denied { getopt } for pid=20322 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 12:16:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) setrlimit(0x4, &(0x7f0000000040)={0x3, 0x7ff}) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe}) (async, rerun: 32) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') (rerun: 32) getdents(r1, 0x0, 0x0) (async) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) (async, rerun: 64) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x4, 0xdd, 0x5, 0x0, 0x100000000, 0x10, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xed6, 0x4, @perf_bp={&(0x7f0000000100), 0xd}, 0x4000, 0x2, 0x3ba3, 0x1, 0x877f, 0x6, 0x1000, 0x0, 0x6, 0x0, 0x8}, r0, 0x0, r1, 0x9) (rerun: 64) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000240)=0x11) (async) getrlimit(0x7, &(0x7f0000000080)) (async) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:16:13 executing program 2: msgrcv(0x0, 0x0, 0x0, 0x0, 0x1800) 12:16:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:16:13 executing program 0: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x7}, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={[0xffffffffffffffff]}, 0x8}) 12:16:13 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/uevent_helper', 0x2, 0x0) 12:16:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:13 executing program 5: msgget(0x2, 0x2ce) 12:16:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty}}}}) 12:16:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @multicast2}, {0x0, @multicast}, 0x2a, {0x2, 0x0, @broadcast}, 'bridge_slave_1\x00'}) 12:16:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@ipv6_newaddrlabel={0x38, 0x48, 0x1, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IFAL_ADDRESS={0x14, 0x1, @mcast2}, @IFAL_LABEL={0x8}]}, 0x38}}, 0x0) [ 2083.281517][T20334] loop3: detected capacity change from 0 to 264192 12:16:13 executing program 2: bpf$MAP_CREATE(0x8, &(0x7f0000000dc0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 12:16:13 executing program 5: r0 = socket(0x2, 0xa, 0x0) fgetxattr(r0, &(0x7f0000000040)=ANY=[], 0x0, 0xfffffffffffffedb) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) 12:16:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) setrlimit(0x4, &(0x7f0000000040)={0x3, 0x7ff}) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r1, 0x0, 0x0) (async) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7, 0x4, 0xdd, 0x5, 0x0, 0x100000000, 0x10, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xed6, 0x4, @perf_bp={&(0x7f0000000100), 0xd}, 0x4000, 0x2, 0x3ba3, 0x1, 0x877f, 0x6, 0x1000, 0x0, 0x6, 0x0, 0x8}, r0, 0x0, r1, 0x9) (async) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000240)=0x11) getrlimit(0x7, &(0x7f0000000080)) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:16:20 executing program 0: r0 = socket(0x18, 0x0, 0x1) setsockopt$inet_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) 12:16:20 executing program 2: clock_nanosleep(0x7, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) 12:16:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={0xfffffffffffffffe}}, 0x0) 12:16:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:16:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:20 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) 12:16:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getpgrp(0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000040)=ANY=[@ANYRES64], 0x1180}], 0x1}, 0x0) 12:16:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x6, 0x4, 0x1}, 0x48) 12:16:20 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0xfffffffffffffffd]}, 0x8}) 12:16:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x12, 0x7fffffff, 0x0, 0x1, 0x0, 0x1}, 0x48) 12:16:20 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r0) [ 2090.411821][T20363] loop3: detected capacity change from 0 to 264192 12:16:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)=0x7fb) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:16:27 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x18, 0x0, &(0x7f0000000100)) 12:16:27 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x6, 0x3, 0x0, &(0x7f0000000100)) 12:16:27 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891e, &(0x7f0000000080)) 12:16:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:16:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:27 executing program 2: socket(0x15, 0x5, 0x7) 12:16:27 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x19, 0x0, &(0x7f0000000100)) 12:16:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"cbead454346ab5aab618813693722b6c"}, 0xf0d, 0x8}}}, 0xa0) 12:16:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b64, 0x0) [ 2097.593276][T20392] loop3: detected capacity change from 0 to 264192 12:16:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b46, &(0x7f0000000040)={0x0, 0x0}) 12:16:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0xa00, 0x0, @in={0x2, 0x0, @multicast2}}}, 0xa0) 12:16:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)=0x7fb) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)=0x7fb) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) (async) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) 12:16:34 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x6, 0x5, 0x0, &(0x7f0000000100)) 12:16:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b4c, &(0x7f0000000040)={0x0, 0x0}) 12:16:34 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x890b, 0x0) 12:16:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:16:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b72, &(0x7f0000000040)={0x0, 0x0}) 12:16:35 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x480, 0x0, &(0x7f0000000080)) 12:16:35 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x21, 0x0, &(0x7f0000000100)) [ 2104.795098][T20422] loop3: detected capacity change from 0 to 264192 12:16:35 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x540c, 0x0) 12:16:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x80045432, &(0x7f0000000040)={0x0, 0x0}) 12:16:35 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x48, 0x400) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000080)=[0xf2]) [ 2104.902785][ T24] audit: type=1400 audit(1645013795.086:380): avc: denied { append } for pid=20439 comm="syz-executor.5" name="event2" dev="devtmpfs" ino=227 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 12:16:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)=0x7fb) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)=0x7fb) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) (async) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) 12:16:44 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8941, 0x0) 12:16:44 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8929, &(0x7f0000000080)) 12:16:44 executing program 5: r0 = socket$inet(0x2, 0x801, 0x0) sendto$phonet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) 12:16:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:16:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:44 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8982, &(0x7f0000000080)) 12:16:44 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8913, &(0x7f0000000080)) 12:16:44 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x13, 0x0, &(0x7f0000000100)) 12:16:44 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, 0x0, &(0x7f0000000080), 0x1) [ 2114.229391][T20517] loop3: detected capacity change from 0 to 264192 12:16:44 executing program 0: r0 = socket$inet(0x2, 0x801, 0x0) sendto$phonet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) 12:16:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b44, 0x0) 12:16:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) setrlimit(0xd, &(0x7f0000000280)={0x3f, 0x100}) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) r1 = getpid() sched_setscheduler(r1, 0x3, &(0x7f0000000040)=0x1) timer_create(0x1, &(0x7f0000000180)={0x0, 0xd, 0x1, @thr={&(0x7f0000000100)="0bfa0fd4a7f244fc056652c957588fff3cbac4cecb048fa97525313707688760d4fc27bb12153c4dcc51b08534adad93614fc078ccb00c5cd03e29608067bb31943f2866fe124df977cdfaa4", &(0x7f0000000080)="b09e4d9b34a3cc430bf995771bee2fa1e8ef4a8001dcd1bbe78351c83bb19f06f4b1d065e1e85eb445f5d2"}}, &(0x7f00000001c0)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) pwrite64(r0, &(0x7f0000000340)="c24c161801e954f94227ad20d56cea76c3cbfa11b0ea29c71ea82e81d85b97f33b67ae8e527da0deb61de80207baca673167640a3792b533210802263ed99d85d3fdea7850fbc2285c1547dcdae61a7f4f7ca03068f867c676cb6fdecb506f6f70cdef6007e5b579bb0bd641e83e2a45028d92e6a092948b66984402171a3b826d24778058392999e16db80547ab67083b4bd06deaf75016f73867b498e3ff88f243437b93bc67ed1d31aa2f50f9424cd29a5ada5ab5a9a0418e2699f1f74e4d26c3b780", 0xc4, 0x2) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x1, 0x2a, 0x6, 0x0, 0x7, 0x28140, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfff, 0x2, @perf_config_ext={0x3}, 0x18, 0x0, 0x2, 0x2, 0x1000, 0x1ff, 0x4b5, 0x0, 0x200}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8d20f27225046730) 12:16:50 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5452, &(0x7f0000000080)) 12:16:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b62, 0x0) 12:16:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b64, &(0x7f0000000040)={0x0, 0x0}) 12:16:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:16:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x80045432, 0x0) 12:16:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b32, 0x0) 12:16:50 executing program 0: r0 = socket(0x11, 0x2, 0x0) getpeername$qrtr(r0, 0x0, 0x0) 12:16:50 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8932, &(0x7f0000000080)) [ 2120.489957][T20630] loop3: detected capacity change from 0 to 264192 12:16:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"cbead454346ab5aab618813693722b6c"}, 0x0, 0x0, 0xfffffffffffffffc}}}, 0xa0) 12:16:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b71, 0x0) 12:16:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) setrlimit(0xd, &(0x7f0000000280)={0x3f, 0x100}) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) r1 = getpid() sched_setscheduler(r1, 0x3, &(0x7f0000000040)=0x1) timer_create(0x1, &(0x7f0000000180)={0x0, 0xd, 0x1, @thr={&(0x7f0000000100)="0bfa0fd4a7f244fc056652c957588fff3cbac4cecb048fa97525313707688760d4fc27bb12153c4dcc51b08534adad93614fc078ccb00c5cd03e29608067bb31943f2866fe124df977cdfaa4", &(0x7f0000000080)="b09e4d9b34a3cc430bf995771bee2fa1e8ef4a8001dcd1bbe78351c83bb19f06f4b1d065e1e85eb445f5d2"}}, &(0x7f00000001c0)) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) pwrite64(r0, &(0x7f0000000340)="c24c161801e954f94227ad20d56cea76c3cbfa11b0ea29c71ea82e81d85b97f33b67ae8e527da0deb61de80207baca673167640a3792b533210802263ed99d85d3fdea7850fbc2285c1547dcdae61a7f4f7ca03068f867c676cb6fdecb506f6f70cdef6007e5b579bb0bd641e83e2a45028d92e6a092948b66984402171a3b826d24778058392999e16db80547ab67083b4bd06deaf75016f73867b498e3ff88f243437b93bc67ed1d31aa2f50f9424cd29a5ada5ab5a9a0418e2699f1f74e4d26c3b780", 0xc4, 0x2) (async) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x1, 0x2a, 0x6, 0x0, 0x7, 0x28140, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfff, 0x2, @perf_config_ext={0x3}, 0x18, 0x0, 0x2, 0x2, 0x1000, 0x1ff, 0x4b5, 0x0, 0x200}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8d20f27225046730) 12:16:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="0216000621"], 0x108}}, 0x0) 12:16:57 executing program 0: pipe(&(0x7f0000000900)) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socket$inet_mptcp(0x2, 0x1, 0x106) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 12:16:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01020000000092b9253d39"], 0x34}}, 0x0) 12:16:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:16:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:16:57 executing program 5: bpf$PROG_LOAD(0x16, &(0x7f0000005c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:16:57 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x541b, 0x0) 12:16:57 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') [ 2126.811718][T20705] loop3: detected capacity change from 0 to 264192 12:16:57 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x1, 0x0) 12:16:57 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8923, &(0x7f0000000080)={'wlan1\x00'}) 12:16:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1d, 0x0, &(0x7f0000000640)) [ 2126.903131][ T24] audit: type=1400 audit(1645013817.086:381): avc: denied { create } for pid=20720 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2126.927126][ T24] audit: type=1400 audit(1645013817.096:382): avc: denied { ioctl } for pid=20720 comm="syz-executor.2" path="socket:[60877]" dev="sockfs" ino=60877 ioctlcmd=0x8923 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 12:17:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) setrlimit(0xd, &(0x7f0000000280)={0x3f, 0x100}) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) r1 = getpid() sched_setscheduler(r1, 0x3, &(0x7f0000000040)=0x1) timer_create(0x1, &(0x7f0000000180)={0x0, 0xd, 0x1, @thr={&(0x7f0000000100)="0bfa0fd4a7f244fc056652c957588fff3cbac4cecb048fa97525313707688760d4fc27bb12153c4dcc51b08534adad93614fc078ccb00c5cd03e29608067bb31943f2866fe124df977cdfaa4", &(0x7f0000000080)="b09e4d9b34a3cc430bf995771bee2fa1e8ef4a8001dcd1bbe78351c83bb19f06f4b1d065e1e85eb445f5d2"}}, &(0x7f00000001c0)) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) pwrite64(r0, &(0x7f0000000340)="c24c161801e954f94227ad20d56cea76c3cbfa11b0ea29c71ea82e81d85b97f33b67ae8e527da0deb61de80207baca673167640a3792b533210802263ed99d85d3fdea7850fbc2285c1547dcdae61a7f4f7ca03068f867c676cb6fdecb506f6f70cdef6007e5b579bb0bd641e83e2a45028d92e6a092948b66984402171a3b826d24778058392999e16db80547ab67083b4bd06deaf75016f73867b498e3ff88f243437b93bc67ed1d31aa2f50f9424cd29a5ada5ab5a9a0418e2699f1f74e4d26c3b780", 0xc4, 0x2) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x1, 0x2a, 0x6, 0x0, 0x7, 0x28140, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfff, 0x2, @perf_config_ext={0x3}, 0x18, 0x0, 0x2, 0x2, 0x1000, 0x1ff, 0x4b5, 0x0, 0x200}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8d20f27225046730) 12:17:04 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x891d, &(0x7f0000000080)={'wlan1\x00'}) 12:17:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x12, 0x0, &(0x7f0000000080)) 12:17:04 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[], 0x38}}, 0x0) 12:17:04 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:17:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x4020940d, &(0x7f0000000080)={'gre0\x00', 0x0}) [ 2133.915146][ T24] audit: type=1400 audit(1645013824.106:383): avc: denied { create } for pid=20733 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2133.945065][T20739] loop3: detected capacity change from 0 to 264192 12:17:04 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x200001, 0x0) 12:17:04 executing program 2: r0 = epoll_create(0x5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x20002014}) [ 2133.946709][ T24] audit: type=1400 audit(1645013824.126:384): avc: denied { write } for pid=20733 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 12:17:04 executing program 0: mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x44030, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) 12:17:04 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 12:17:04 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg$nfc_llcp(r0, 0x0, 0x0, 0x0) [ 2133.999238][ T24] audit: type=1400 audit(1645013824.176:385): avc: denied { block_suspend } for pid=20749 comm="syz-executor.2" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 12:17:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 12:17:11 executing program 2: socketpair(0x2c, 0x3, 0x7, &(0x7f0000000000)) 12:17:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x40086602, &(0x7f0000000080)={'gre0\x00', 0x0}) 12:17:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:17:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x4, 0x0, 0x67, 0x0, 0x1}, 0x48) 12:17:11 executing program 4: prlimit64(0x0, 0xc, &(0x7f0000000040)={0x0, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt6_stats\x00') getdents(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) fallocate(r2, 0x2, 0x101, 0x2) ioctl$TCSBRKP(r1, 0x5425, 0x1f) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, 0x0, 0x0) getdents64(r3, &(0x7f0000000080)=""/64, 0x40) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x2000, 0x9c) getdents(r4, &(0x7f0000000180)=""/15, 0xf) read$msr(r3, &(0x7f0000000340)=""/243, 0xfffffe9f) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:17:11 executing program 0: pipe(&(0x7f0000000e00)) 12:17:11 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, 0x0, 0x0) 12:17:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv6_newnexthop={0x30, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4}, @NHA_GATEWAY={0x14, 0x6, @in6_addr=@rand_addr=' \x01\x00'}]}, 0x30}}, 0x0) [ 2141.041647][T20774] loop3: detected capacity change from 0 to 264192 12:17:11 executing program 5: socketpair(0x23, 0x5, 0x0, &(0x7f0000000340)) 12:17:11 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 12:17:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, 0x0, 0x0) 12:17:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x30, 0x3, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x6, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_CLOSED={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x30}}, 0x0) 12:17:11 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000040)=0x8, 0x4) 12:17:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:17:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @empty}}}, 0x200002d0) [ 2142.037000][T20806] loop3: detected capacity change from 0 to 264192 12:17:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x0}}}, 0x1c}}, 0x0) 12:17:19 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x0, @loopback}}, 0x24) 12:17:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv6_getaddrlabel={0x1c, 0x4a, 0x1}, 0x1c}}, 0x0) 12:17:19 executing program 4: prlimit64(0x0, 0xc, &(0x7f0000000040)={0x0, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt6_stats\x00') getdents(r1, 0x0, 0x0) (async) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async) fallocate(r2, 0x2, 0x101, 0x2) ioctl$TCSBRKP(r1, 0x5425, 0x1f) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, 0x0, 0x0) (async) getdents64(r3, &(0x7f0000000080)=""/64, 0x40) (async) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x2000, 0x9c) getdents(r4, &(0x7f0000000180)=""/15, 0xf) (async) read$msr(r3, &(0x7f0000000340)=""/243, 0xfffffe9f) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:17:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:17:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000740), 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) pipe(&(0x7f0000000900)={0xffffffffffffffff}) getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x17, 0x0, 0x80000, 0x101, 0x80, r1, 0x9, '\x00', 0x0, r1}, 0x48) 12:17:19 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) connect$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) 12:17:19 executing program 0: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 12:17:19 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000100)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}}, 0x24) [ 2149.313275][T20814] loop3: detected capacity change from 0 to 264192 12:17:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x2, 0x3, 0x301, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_MASK={0x8}]}, 0x24}}, 0x0) 12:17:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fddbdf251a"], 0x50}}, 0x0) 12:17:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000640)) 12:17:19 executing program 2: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4b}, 0xbb) 12:17:19 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) [ 2149.435975][T20835] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 12:17:26 executing program 4: prlimit64(0x0, 0xc, &(0x7f0000000040)={0x0, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt6_stats\x00') getdents(r1, 0x0, 0x0) (async) getdents64(r1, &(0x7f0000000080)=""/64, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async) fallocate(r2, 0x2, 0x101, 0x2) (async) ioctl$TCSBRKP(r1, 0x5425, 0x1f) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, 0x0, 0x0) (async) getdents64(r3, &(0x7f0000000080)=""/64, 0x40) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x2000, 0x9c) getdents(r4, &(0x7f0000000180)=""/15, 0xf) (async) read$msr(r3, &(0x7f0000000340)=""/243, 0xfffffe9f) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:17:26 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8982, &(0x7f00000000c0)) 12:17:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:26 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0xc0189436, 0x0) 12:17:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1e, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 12:17:26 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:17:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380), 0xc) 12:17:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x6, 0x4) 12:17:26 executing program 0: r0 = syz_io_uring_setup(0x3f66, &(0x7f0000000300), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x10000000) 12:17:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x3}, 0x0, 0x0, r0) 12:17:26 executing program 5: add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, "4d1c6d9bc777327f74ebcaa8a6aacfcb10da025e8c5b9c56ffc684ac8e16a2e4caf2a63be35da61718235b53984cf69e9c67f83a1b401673b3edf0c13659f1b2"}, 0x48, 0xfffffffffffffffe) 12:17:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8912, 0x0) [ 2156.472059][ T24] audit: type=1400 audit(1645013846.656:386): avc: denied { ioctl } for pid=20845 comm="syz-executor.0" path="socket:[61072]" dev="sockfs" ino=61072 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2156.511100][T20853] loop3: detected capacity change from 0 to 264192 12:17:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) setrlimit(0x6, &(0x7f0000000040)={0x1, 0xffffffff}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:17:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000a00)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000800)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 12:17:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) 12:17:33 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bind$isdn_base(r0, 0x0, 0x0) 12:17:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:17:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:33 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0, 0x0, 0x0) 12:17:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) 12:17:33 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 12:17:33 executing program 2: bpf$PROG_LOAD(0x16, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2163.602093][T20877] loop3: detected capacity change from 0 to 264192 12:17:33 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffc) 12:17:33 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400), 0x81, 0x0) 12:17:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async, rerun: 64) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (rerun: 64) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) setrlimit(0x6, &(0x7f0000000040)={0x1, 0xffffffff}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:17:38 executing program 0: r0 = socket(0x2, 0x3, 0x8) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000080)={0x0, {{0x2, 0x0, @multicast1}}}, 0x90) 12:17:38 executing program 2: r0 = socket(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) 12:17:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0xe, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:17:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:17:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:17:38 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="710000006f01"], 0x71) 12:17:38 executing program 2: syz_emit_ethernet(0xaa, &(0x7f0000000540)={@local, @multicast, @val={@void}, {@ipv4={0x800, @gre={{0x15, 0x4, 0x0, 0x0, 0x98, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x39, 0x0, [{0x0, 0x11, "b2c3b9f06d91e6282a7b9fc602b631"}, {0x0, 0x4, "8cff"}, {0x0, 0x11, "508455e6eeef2d84076cdd6d406343"}, {0x0, 0x2}, {0x0, 0xb, "9bbb0559a6c61562b1"}]}, @timestamp_addr={0x44, 0x4}]}}}}}}, 0x0) 12:17:38 executing program 0: socket(0x1d, 0x0, 0x7d) 12:17:38 executing program 5: r0 = fsopen(&(0x7f0000000000)='nfsd\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='\x00', &(0x7f00000000c0)='nfsd\x00', 0x0) [ 2168.635994][T20951] loop3: detected capacity change from 0 to 264192 12:17:38 executing program 2: fsmount(0xffffffffffffffff, 0x0, 0x8d) 12:17:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) setrlimit(0x6, &(0x7f0000000040)={0x1, 0xffffffff}) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:17:45 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x24, @short}, 0x14, &(0x7f0000000180)={0x0}}, 0x0) 12:17:45 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000400)={0x24, @short}, 0x14) 12:17:45 executing program 0: fsopen(&(0x7f0000000100)='cramfs\x00', 0x0) 12:17:45 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:17:45 executing program 5: recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000980), 0xffffffffffffffff) 12:17:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) [ 2175.752428][ T24] audit: type=1400 audit(1645013865.936:387): avc: denied { bind } for pid=20975 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 2175.764824][T20979] loop3: detected capacity change from 0 to 264192 12:17:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x11) 12:17:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xd, &(0x7f00000000c0)=0x7, 0x4) 12:17:46 executing program 5: fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 12:17:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x3, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x4, 0x0, 0x8, 0x0, 0x0, 0x10}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xf2, &(0x7f0000000240)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2175.799352][ T24] audit: type=1400 audit(1645013865.976:388): avc: denied { write } for pid=20974 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 12:17:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe}) rt_sigqueueinfo(r0, 0x41, &(0x7f0000000040)={0x5, 0x273460e3, 0x4}) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:17:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x3, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x0, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xf2, &(0x7f0000000240)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:17:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x3, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x4, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xf2, &(0x7f0000000240)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:17:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x3, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x4, 0x0, 0x0, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xf2, &(0x7f0000000240)=""/242, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:17:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:17:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x303}, "41a081779b7694ba", "f818a8e8ce408fed2fca72be054c1d7d", "b29cc9a6", "a250d91a30e23fb9"}, 0x28) 12:17:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2182.983422][T21015] loop3: detected capacity change from 0 to 264192 [ 2182.990988][T21021] loop5: detected capacity change from 0 to 264192 12:17:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:17:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 2183.889683][T21035] loop2: detected capacity change from 0 to 264192 12:17:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe}) rt_sigqueueinfo(r0, 0x41, &(0x7f0000000040)={0x5, 0x273460e3, 0x4}) (async) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) (async) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:18:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2190.073432][T21045] loop2: detected capacity change from 0 to 264192 [ 2190.090770][T21052] loop5: detected capacity change from 0 to 264192 [ 2190.098171][T21053] loop3: detected capacity change from 0 to 264192 12:18:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2191.748041][T21066] loop3: detected capacity change from 0 to 264192 12:18:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2192.544637][T21073] loop5: detected capacity change from 0 to 264192 12:18:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00'], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe}) (async) rt_sigqueueinfo(r0, 0x41, &(0x7f0000000040)={0x5, 0x273460e3, 0x4}) (async) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:18:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00'], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 2202.597235][T21093] loop2: detected capacity change from 0 to 264192 [ 2202.602269][T21090] loop3: detected capacity change from 0 to 264192 [ 2202.606179][T21092] loop5: detected capacity change from 0 to 264192 12:18:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2203.774915][T21110] loop3: detected capacity change from 0 to 264192 12:18:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:15 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2204.907788][T21117] loop3: detected capacity change from 0 to 264192 12:18:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2205.567128][T21123] loop2: detected capacity change from 0 to 264192 12:18:22 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2211.845525][T21137] loop5: detected capacity change from 0 to 264192 [ 2211.847917][T21136] loop2: detected capacity change from 0 to 264192 [ 2211.856847][T21133] loop3: detected capacity change from 0 to 264192 12:18:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_BCAST_FLOOD={0x5}, @IFLA_BRPORT_VLAN_TUNNEL={0x5}]}}}]}, 0x4c}}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x801, 0x184) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000e900000018000000", @ANYRES32=r5, @ANYRES32, @ANYRES64=r1, @ANYBLOB='.C!,ce0\x00']) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x80005) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000240)={'bridge0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r7, 0x2, r8, 0xe7}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r7, 0x1, r2, 0x5, 0x80000}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:18:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2213.500820][T21152] loop3: detected capacity change from 0 to 264192 12:18:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:25 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2215.017442][T21167] loop3: detected capacity change from 0 to 264192 [ 2215.023677][T21169] loop5: detected capacity change from 0 to 264192 [ 2215.114629][T21171] loop2: detected capacity change from 0 to 264192 12:18:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_BCAST_FLOOD={0x5}, @IFLA_BRPORT_VLAN_TUNNEL={0x5}]}}}]}, 0x4c}}, 0x0) (async) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x801, 0x184) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000e900000018000000", @ANYRES32=r5, @ANYRES32, @ANYRES64=r1, @ANYBLOB='.C!,ce0\x00']) (async) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x80005) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) (async) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000240)={'bridge0\x00'}) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r7, 0x2, r8, 0xe7}) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r7, 0x1, r2, 0x5, 0x80000}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:18:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 2225.275959][T21185] loop2: detected capacity change from 0 to 264192 [ 2225.277292][T21187] loop3: detected capacity change from 0 to 264192 [ 2225.294458][T21180] loop5: detected capacity change from 0 to 264192 12:18:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2226.962474][T21202] loop3: detected capacity change from 0 to 264192 12:18:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 2227.941044][T21208] loop2: detected capacity change from 0 to 264192 12:18:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_BCAST_FLOOD={0x5}, @IFLA_BRPORT_VLAN_TUNNEL={0x5}]}}}]}, 0x4c}}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x801, 0x184) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000e900000018000000", @ANYRES32=r5, @ANYRES32, @ANYRES64=r1, @ANYBLOB='.C!,ce0\x00']) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x80005) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000240)={'bridge0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r7, 0x2, r8, 0xe7}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r7, 0x1, r2, 0x5, 0x80000}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) (async) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_BCAST_FLOOD={0x5}, @IFLA_BRPORT_VLAN_TUNNEL={0x5}]}}}]}, 0x4c}}, 0x0) (async) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x801, 0x184) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000e900000018000000", @ANYRES32=r5, @ANYRES32, @ANYRES64=r1, @ANYBLOB='.C!,ce0\x00']) (async) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x80005) (async) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000240)={'bridge0\x00'}) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r7, 0x2, r8, 0xe7}) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r7, 0x1, r2, 0x5, 0x80000}) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) (async) 12:18:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 2236.643473][T21226] loop3: detected capacity change from 0 to 264192 [ 2236.649279][T21225] loop5: detected capacity change from 0 to 264192 12:18:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2237.639075][T21246] loop2: detected capacity change from 0 to 264192 12:18:58 executing program 4: r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe}) prlimit64(r0, 0xe, &(0x7f00000000c0)={0x7fffffff, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:18:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:18:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2248.086983][T21266] loop2: detected capacity change from 0 to 264192 [ 2248.097832][T21263] loop3: detected capacity change from 0 to 264192 12:18:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:18:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2249.257905][T21276] loop5: detected capacity change from 0 to 264192 12:18:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2249.467764][T21279] loop3: detected capacity change from 0 to 264192 [ 2249.710495][T21280] ================================================================== [ 2249.718597][T21280] BUG: KCSAN: data-race in __blk_mq_sched_dispatch_requests / blk_mq_run_hw_queue [ 2249.727799][T21280] [ 2249.730119][T21280] write to 0xffff8881027fa210 of 8 bytes by task 39 on cpu 0: [ 2249.737573][T21280] __blk_mq_sched_dispatch_requests+0x137/0x270 [ 2249.743826][T21280] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 2249.749852][T21280] __blk_mq_run_hw_queue+0x7e/0x100 [ 2249.755057][T21280] __blk_mq_delay_run_hw_queue+0x19c/0x390 [ 2249.760868][T21280] blk_mq_run_hw_queue+0x180/0x310 [ 2249.765977][T21280] blk_mq_run_hw_queues+0x1d1/0x230 [ 2249.771187][T21280] blk_mq_requeue_work+0x3bd/0x3f0 [ 2249.776301][T21280] process_one_work+0x3f6/0x960 [ 2249.781155][T21280] worker_thread+0x616/0xa70 [ 2249.785752][T21280] kthread+0x1bf/0x1e0 [ 2249.789844][T21280] ret_from_fork+0x1f/0x30 [ 2249.794355][T21280] [ 2249.796671][T21280] read to 0xffff8881027fa210 of 8 bytes by task 21280 on cpu 1: [ 2249.804295][T21280] blk_mq_run_hw_queue+0x19b/0x310 [ 2249.809404][T21280] blk_mq_sched_insert_request+0x117/0x220 [ 2249.815214][T21280] blk_mq_submit_bio+0xb01/0xec0 [ 2249.820151][T21280] __submit_bio+0x151/0x350 [ 2249.824654][T21280] submit_bio_noacct+0x418/0x4e0 [ 2249.829614][T21280] submit_bio+0x10c/0x180 [ 2249.833946][T21280] ext4_mpage_readpages+0xe60/0xeb0 [ 2249.839148][T21280] filemap_read+0x852/0x1430 [ 2249.843741][T21280] generic_file_read_iter+0x72/0x320 [ 2249.849034][T21280] generic_file_splice_read+0x24f/0x330 [ 2249.854588][T21280] splice_direct_to_actor+0x2aa/0x650 [ 2249.859966][T21280] do_splice_direct+0x106/0x190 [ 2249.864821][T21280] do_sendfile+0x675/0xc40 [ 2249.869239][T21280] __x64_sys_sendfile64+0x102/0x140 [ 2249.874439][T21280] do_syscall_64+0x44/0xd0 [ 2249.878853][T21280] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2249.884749][T21280] [ 2249.887063][T21280] value changed: 0xffff8881013fa048 -> 0xffff8881027fa208 [ 2249.894159][T21280] [ 2249.896475][T21280] Reported by Kernel Concurrency Sanitizer on: 12:19:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 2249.902607][T21280] CPU: 1 PID: 21280 Comm: syz-executor.5 Not tainted 5.17.0-rc4-syzkaller-00051-gc5d9ae265b10-dirty #0 [ 2249.913629][T21280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2249.923680][T21280] ================================================================== 12:19:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="6987b908ff142d02f598873c8dd0a5b1a30a327f2d1d6fbbb8761c63a63fd835744930633f3cb026230062b66c280f1f31ee56a490a0e03c4d5e779a7f31f37952a63425aa71c02b28de808edfd7008bf3373b26b60d65a7ee591cba1ce36fe4ebf0b6416eae8f58c1afda1deb1ca5d2fa427a176792c355ebc89a41050bd6f26453c4f7d4f64a387595e92b2dc0e75e8e60c2a719cbf4eb578d1f285ffb37f6bfd1ffb9dd02329267885095ad1d12105f2b870fa523b1ad52bac3841f5cb7225801a854e2e8400b4e9e39b44d04455cdac0ef9abef68f1fd393cd3495b57b11a8faaa602b4da0f3be1e4eed0c96b67cd5f0cad0acd280ece9e359634df687976f879a75ea94388c5afb239a628ab168cab3570e12775dd778a3dfce4c2e9391478f1542386a503890d0674c2817759fd9453b4a50c0338b7ecfb687cfb1a336e59db1d3181699859be5b8125bac233b4a98035ba9516e9804aca3ffbeed2ae62f3c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:19:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) [ 2250.842057][T21286] loop3: detected capacity change from 0 to 264192 12:19:08 executing program 4: r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe}) prlimit64(r0, 0xe, &(0x7f00000000c0)={0x7fffffff, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0x11) (async, rerun: 64) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) (async, rerun: 64) ioctl$VT_WAITACTIVE(r1, 0x5607) (async) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) 12:19:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:19:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:19:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b2900) sendfile(r1, r0, 0x0, 0x8000000000004) 12:19:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) 12:19:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x7, 0x20, 0x9a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x4, 0x3, 0x4, 0x0, 0x2, 0x4, 0x401, 0x0, 0x3, 0x0, 0x208}, r1, 0x10, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010029bd700013676e02d218fc20b67133dbfd048a4300"/40], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b2900) sendfile(r3, r2, 0x0, 0x8000000000004) [ 2258.565484][T21303] loop3: detected capacity change from 0 to 264192 [ 2258.565600][T21300] loop2: detected capacity change from 0 to 264192 [ 2258.589185][T21301] loop5: detected capacity change from 0 to 264192 12:19:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[], 0x24}}, 0x14000800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004)