0480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 544.488620][T17391] loop1: detected capacity change from 0 to 17 [ 544.545007][T17395] loop4: detected capacity change from 0 to 17 09:13:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3009, 0x7fff) [ 544.670140][T17400] loop3: detected capacity change from 0 to 17 09:13:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x6ae, 0x7fff) 09:13:03 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1809, 0x7fff) 09:13:03 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:03 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 544.916918][T17414] loop1: detected capacity change from 0 to 17 [ 544.982664][T17426] loop4: detected capacity change from 0 to 17 [ 545.019178][T17414] loop1: detected capacity change from 0 to 17 09:13:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x700, 0x7fff) [ 545.106900][T17441] loop3: detected capacity change from 0 to 17 09:13:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3604, 0x7fff) [ 545.355135][T17455] loop4: detected capacity change from 0 to 17 [ 545.449721][T17458] loop1: detected capacity change from 0 to 17 09:13:04 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:04 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:04 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1f00, 0x7fff) 09:13:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x70d, 0x7fff) 09:13:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3f00, 0x7fff) 09:13:04 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 545.954161][T17481] loop4: detected capacity change from 0 to 17 [ 545.965603][T17484] loop3: detected capacity change from 0 to 17 [ 546.003091][T17488] loop1: detected capacity change from 0 to 17 09:13:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x900, 0x7fff) 09:13:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4000, 0x7fff) 09:13:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x1003, 0x7fff) 09:13:05 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x2000, 0x7fff) [ 546.350080][T17513] loop1: detected capacity change from 0 to 17 09:13:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4100, 0x7fff) [ 546.464888][ T26] audit: type=1800 audit(1638781985.210:33): pid=17516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="file0" dev="loop1" ino=1048860 res=0 errno=0 [ 546.604420][T17523] loop5: detected capacity change from 0 to 17 [ 546.643747][T17522] loop4: detected capacity change from 0 to 17 [ 546.823229][T17534] loop3: detected capacity change from 0 to 17 09:13:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000005, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f00000003c0)=ANY=[]) r3 = getpid() sched_setscheduler(r3, 0x5, 0x0) wait4(r3, 0x0, 0x0, &(0x7f0000000240)) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r0}, 0x8) flistxattr(r2, 0x0, 0x0) openat(r2, 0x0, 0x181080, 0x18a) r5 = socket(0x80000000000000a, 0x2, 0x0) r6 = socket(0x80000000000000a, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r4) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x9c, r7, 0x400, 0x70bd27, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0x9c}, 0x1, 0x0, 0x0, 0xc0}, 0x20000890) openat(r2, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 547.219429][T17545] loop1: detected capacity change from 0 to 17 [ 547.406940][T17553] loop5: detected capacity change from 0 to 264192 09:13:07 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:07 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xc00, 0x7fff) 09:13:07 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x2301, 0x7fff) 09:13:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4400, 0x7fff) [ 548.551458][T17570] loop4: detected capacity change from 0 to 17 [ 548.557296][T17569] loop1: detected capacity change from 0 to 17 [ 548.583929][T17574] loop3: detected capacity change from 0 to 17 09:13:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4607, 0x7fff) 09:13:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xd00, 0x7fff) 09:13:07 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x2b04, 0x7fff) [ 548.988874][T17597] loop1: detected capacity change from 0 to 17 [ 548.995096][T17599] loop4: detected capacity change from 0 to 17 09:13:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4700, 0x7fff) 09:13:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xd07, 0x7fff) [ 549.306358][T17611] loop3: detected capacity change from 0 to 17 09:13:08 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 549.451995][T17622] loop1: detected capacity change from 0 to 17 [ 549.496545][T17626] loop4: detected capacity change from 0 to 17 09:13:09 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:09 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:09 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3307, 0x7fff) 09:13:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4a00, 0x7fff) 09:13:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xe00, 0x7fff) 09:13:09 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 550.756927][T17655] loop4: detected capacity change from 0 to 17 [ 550.771499][T17656] loop3: detected capacity change from 0 to 17 [ 550.812402][T17660] loop1: detected capacity change from 0 to 17 09:13:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1200, 0x7fff) 09:13:09 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4c02, 0x7fff) 09:13:09 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3b0a, 0x7fff) 09:13:10 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 551.304859][T17688] loop4: detected capacity change from 0 to 17 [ 551.371984][T17691] loop1: detected capacity change from 0 to 17 09:13:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1504, 0x7fff) 09:13:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4d00, 0x7fff) [ 551.490750][T17699] loop3: detected capacity change from 0 to 17 [ 551.710206][T17714] loop4: detected capacity change from 0 to 17 [ 551.829773][T17720] loop1: detected capacity change from 0 to 17 09:13:11 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:11 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:11 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3f00, 0x7fff) 09:13:11 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1d01, 0x7fff) 09:13:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5000, 0x7fff) [ 553.105644][T17738] loop4: detected capacity change from 0 to 17 [ 553.126971][T17740] loop1: detected capacity change from 0 to 17 [ 553.158848][T17742] loop3: detected capacity change from 0 to 17 09:13:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1f00, 0x7fff) 09:13:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5300, 0x7fff) 09:13:12 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x4602, 0x7fff) [ 553.593001][T17767] loop4: detected capacity change from 0 to 17 [ 553.663819][T17769] loop1: detected capacity change from 0 to 17 09:13:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x3205, 0x7fff) [ 553.833273][T17769] loop1: detected capacity change from 0 to 17 [ 553.882746][T17782] loop3: detected capacity change from 0 to 17 09:13:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5600, 0x7fff) 09:13:12 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 554.094254][T17796] loop4: detected capacity change from 0 to 17 [ 554.259107][T17802] loop1: detected capacity change from 0 to 17 09:13:14 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x3a02, 0x7fff) 09:13:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5900, 0x7fff) 09:13:14 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x4e05, 0x7fff) 09:13:14 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:14 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 555.427363][T17829] loop1: detected capacity change from 0 to 17 [ 555.442378][T17832] loop3: detected capacity change from 0 to 17 [ 555.461900][T17836] loop4: detected capacity change from 0 to 17 09:13:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5c00, 0x7fff) 09:13:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x3f00, 0x7fff) [ 555.814117][T17855] loop1: detected capacity change from 0 to 17 09:13:14 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x5608, 0x7fff) [ 556.002591][T17866] loop4: detected capacity change from 0 to 17 09:13:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5c05, 0x7fff) 09:13:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x4000, 0x7fff) [ 556.198031][T17873] loop3: detected capacity change from 0 to 17 09:13:15 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 556.320842][T17881] loop1: detected capacity change from 0 to 17 [ 556.382241][T17888] loop4: detected capacity change from 0 to 17 09:13:16 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:16 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x6000, 0x7fff) 09:13:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5f00, 0x7fff) 09:13:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x4f06, 0x7fff) 09:13:16 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 557.808701][T17913] loop4: detected capacity change from 0 to 17 [ 557.822119][T17915] loop1: detected capacity change from 0 to 17 [ 557.863697][T17921] loop3: detected capacity change from 0 to 17 09:13:17 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x5703, 0x7fff) 09:13:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6200, 0x7fff) 09:13:17 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x6100, 0x7fff) 09:13:17 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 558.673233][T17947] loop3: detected capacity change from 0 to 17 [ 558.681316][T17946] loop1: detected capacity change from 0 to 17 [ 558.706937][T17951] loop4: detected capacity change from 0 to 17 09:13:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6500, 0x7fff) 09:13:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x5f00, 0x7fff) [ 559.054411][T17973] loop1: detected capacity change from 0 to 17 [ 559.155654][T17980] loop4: detected capacity change from 0 to 17 09:13:18 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:18 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x6903, 0x7fff) 09:13:18 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6800, 0x7fff) 09:13:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x7404, 0x7fff) [ 559.451390][T18001] loop1: detected capacity change from 0 to 17 [ 559.463046][T18000] loop3: detected capacity change from 0 to 17 [ 559.522653][T18006] loop4: detected capacity change from 0 to 17 09:13:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6b00, 0x7fff) 09:13:18 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x7c01, 0x7fff) 09:13:18 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x7106, 0x7fff) 09:13:18 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 559.864607][T18029] loop1: detected capacity change from 0 to 17 [ 559.998305][T18032] loop4: detected capacity change from 0 to 17 09:13:18 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x8100, 0x7fff) [ 560.121919][T18029] loop1: detected capacity change from 0 to 17 [ 560.124802][T18040] loop3: detected capacity change from 0 to 17 [ 560.528436][T18064] loop4: detected capacity change from 0 to 17 09:13:19 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6c08, 0x7fff) 09:13:19 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x7909, 0x7fff) 09:13:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x8400, 0x7fff) 09:13:19 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:19 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 561.293934][T18086] loop1: detected capacity change from 0 to 17 [ 561.294955][T18085] loop4: detected capacity change from 0 to 17 [ 561.301149][T18088] loop3: detected capacity change from 0 to 17 09:13:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9105, 0x7fff) 09:13:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6e00, 0x7fff) 09:13:20 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:20 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x8401, 0x7fff) [ 561.671951][T18115] loop4: detected capacity change from 0 to 17 [ 561.689524][T18117] loop1: detected capacity change from 0 to 17 09:13:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9500, 0x7fff) 09:13:20 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 561.961852][T18129] loop3: detected capacity change from 0 to 17 [ 562.189731][T18142] loop4: detected capacity change from 0 to 17 [ 562.578727][ T1231] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.585056][ T1231] ieee802154 phy1 wpan1: encryption failed: -22 09:13:21 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7203, 0x7fff) 09:13:21 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:21 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:21 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x8c04, 0x7fff) 09:13:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9800, 0x7fff) 09:13:22 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 563.229083][T18168] loop1: detected capacity change from 0 to 17 [ 563.229511][T18170] loop3: detected capacity change from 0 to 17 [ 563.255142][T18174] loop4: detected capacity change from 0 to 17 [ 563.269160][T10726] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 563.290513][T10632] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 09:13:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7800, 0x7fff) 09:13:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9902, 0x7fff) 09:13:22 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x9407, 0x7fff) 09:13:22 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 563.885159][T18203] loop1: detected capacity change from 0 to 17 [ 563.902060][T18204] loop4: detected capacity change from 0 to 17 09:13:22 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 564.051513][T18211] loop3: detected capacity change from 0 to 17 09:13:23 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7b00, 0x7fff) 09:13:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9b00, 0x7fff) 09:13:23 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:23 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xa702, 0x7fff) [ 565.058469][T18239] loop3: detected capacity change from 0 to 17 [ 565.090427][T18241] loop4: detected capacity change from 0 to 17 [ 565.094720][T18242] loop1: detected capacity change from 0 to 17 [ 565.117383][T10482] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 09:13:24 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9e00, 0x7fff) 09:13:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7e00, 0x7fff) 09:13:24 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:24 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xaf05, 0x7fff) [ 565.614773][T18272] loop1: detected capacity change from 0 to 17 [ 565.688670][T18275] loop4: detected capacity change from 0 to 17 09:13:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x8100, 0x7fff) 09:13:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xa100, 0x7fff) [ 565.972970][T18287] loop3: detected capacity change from 0 to 17 [ 566.102298][T18295] loop1: detected capacity change from 0 to 17 [ 566.164301][T18300] loop4: detected capacity change from 0 to 17 09:13:25 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:25 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x8206, 0x7fff) 09:13:25 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:25 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xb708, 0x7fff) 09:13:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xa400, 0x7fff) [ 567.104535][T18328] loop1: detected capacity change from 0 to 17 [ 567.154945][T18330] loop3: detected capacity change from 0 to 17 [ 567.164469][T18333] loop4: detected capacity change from 0 to 17 09:13:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x8400, 0x7fff) 09:13:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xa700, 0x7fff) 09:13:26 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:26 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xc200, 0x7fff) [ 567.555627][T18360] loop1: detected capacity change from 0 to 17 [ 567.639911][T18365] loop4: detected capacity change from 0 to 17 09:13:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x8801, 0x7fff) [ 567.747303][T18371] loop3: detected capacity change from 0 to 17 09:13:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xaa00, 0x7fff) [ 568.037283][T18387] loop4: detected capacity change from 0 to 17 [ 568.071986][T18390] loop1: detected capacity change from 0 to 17 09:13:27 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:27 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:27 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:27 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xca03, 0x7fff) 09:13:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xad00, 0x7fff) 09:13:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x9209, 0x7fff) [ 568.702580][T18415] loop4: detected capacity change from 0 to 17 [ 568.729267][T18418] loop3: detected capacity change from 0 to 17 [ 568.741961][T18419] loop1: detected capacity change from 0 to 17 09:13:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x9804, 0x7fff) 09:13:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xae06, 0x7fff) 09:13:27 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:27 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xd206, 0x7fff) [ 569.167795][T18447] loop1: detected capacity change from 0 to 17 [ 569.192016][T18449] loop4: detected capacity change from 0 to 17 09:13:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xa807, 0x7fff) 09:13:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb000, 0x7fff) [ 569.393140][T18459] loop3: detected capacity change from 0 to 17 [ 569.539867][T18470] loop4: detected capacity change from 0 to 17 [ 569.552622][T18471] loop1: detected capacity change from 0 to 17 09:13:28 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:28 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:28 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb300, 0x7fff) 09:13:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xae02, 0x7fff) 09:13:28 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xda09, 0x7fff) [ 569.913610][T18494] loop1: detected capacity change from 0 to 17 [ 569.927647][T18497] loop4: detected capacity change from 0 to 17 09:13:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xb900, 0x7fff) 09:13:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb600, 0x7fff) [ 570.018478][T18506] loop3: detected capacity change from 0 to 17 09:13:28 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:29 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xe501, 0x7fff) [ 570.366058][T18527] loop1: detected capacity change from 0 to 17 [ 570.406590][T18528] loop4: detected capacity change from 0 to 17 09:13:29 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 570.546434][T18528] loop4: detected capacity change from 0 to 17 [ 570.551423][T18527] loop1: detected capacity change from 0 to 17 09:13:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb603, 0x7fff) [ 570.630050][T18547] loop3: detected capacity change from 0 to 17 [ 570.780354][T18559] loop4: detected capacity change from 0 to 17 09:13:30 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xbc00, 0x7fff) 09:13:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb900, 0x7fff) 09:13:30 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:30 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:30 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xed04, 0x7fff) [ 571.690982][T18584] loop1: detected capacity change from 0 to 17 [ 571.693999][T18583] loop3: detected capacity change from 0 to 17 [ 571.719185][T18585] loop4: detected capacity change from 0 to 17 09:13:30 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xbe05, 0x7fff) 09:13:30 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xbc00, 0x7fff) 09:13:30 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xf507, 0x7fff) [ 572.171126][T18613] loop1: detected capacity change from 0 to 17 09:13:31 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 572.300721][T18621] loop4: detected capacity change from 0 to 17 [ 572.511117][T18630] loop3: detected capacity change from 0 to 17 [ 572.865877][T18628] loop3: detected capacity change from 0 to 17 09:13:32 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xc000, 0x7fff) 09:13:32 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xbe00, 0x7fff) 09:13:32 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xf6ff, 0x7fff) 09:13:32 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000180)=0x7fffffff, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 573.661439][T18658] loop1: detected capacity change from 0 to 17 [ 573.664866][T18659] loop3: detected capacity change from 0 to 17 [ 573.726023][T18660] loop4: detected capacity change from 0 to 17 09:13:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xc400, 0x7fff) 09:13:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xbf00, 0x7fff) 09:13:32 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:32 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:32 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfff6, 0x7fff) [ 574.153716][T18685] loop1: detected capacity change from 0 to 17 [ 574.175843][T18689] loop4: detected capacity change from 0 to 17 09:13:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xce08, 0x7fff) [ 574.376897][T18699] loop3: detected capacity change from 0 to 17 [ 574.619184][T18710] loop1: detected capacity change from 0 to 17 [ 574.653695][T18699] loop3: detected capacity change from 0 to 17 09:13:34 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xd304, 0x7fff) 09:13:34 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xd403, 0x7fff) 09:13:34 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1517f, 0x7fff) 09:13:34 executing program 5: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfff6, 0x7fff) [ 575.561696][T18737] loop5: detected capacity change from 0 to 17 [ 575.569537][T18738] loop3: detected capacity change from 0 to 17 [ 575.639322][T18746] loop1: detected capacity change from 0 to 17 [ 575.646554][T18745] loop4: detected capacity change from 0 to 17 09:13:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xe406, 0x7fff) 09:13:34 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x80001, 0x7fff) 09:13:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xdb01, 0x7fff) 09:13:34 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:34 executing program 5: clone(0x2000000002240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x80, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x66000500) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x8, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xe4ae, 0x0, @perf_config_ext={0x8, 0x401}, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x6243, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x48, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x40, 0xed, 0x2, 0x0, 0x100000001, 0x0, 0x16, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x4, 0x1}, 0x10080, 0x80000001, 0x5, 0x5, 0x6, 0x1, 0x58c0, 0x0, 0x0, 0x0, 0x100000000}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) unshare(0x2000000) ppoll(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x8) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000340)={0xf010000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, &(0x7f0000000200)={0x0, 0x401}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) mremap(&(0x7f0000520000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f00004dd000/0x2000)=nil) openat$dir(0xffffffffffffff9c, 0x0, 0xaf2df6b12b60c4bd, 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 09:13:34 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 576.119885][T18781] loop1: detected capacity change from 0 to 17 [ 576.126583][T18784] loop3: detected capacity change from 0 to 17 [ 576.174198][T18788] loop4: detected capacity change from 0 to 17 09:13:35 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xea01, 0x7fff) 09:13:35 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xa0000, 0x7fff) 09:13:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf005, 0x7fff) 09:13:35 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 577.205437][T18821] loop4: detected capacity change from 0 to 17 [ 577.216994][T18823] loop1: detected capacity change from 0 to 17 [ 577.217989][T18822] loop3: detected capacity change from 0 to 17 09:13:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf802, 0x7fff) 09:13:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xfa04, 0x7fff) 09:13:36 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:36 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x100000, 0x7fff) [ 577.541667][T18845] loop4: detected capacity change from 0 to 17 [ 577.643965][T18854] loop1: detected capacity change from 0 to 17 09:13:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xff0f, 0x7fff) [ 577.887328][T18863] loop3: detected capacity change from 0 to 17 [ 577.989175][T18871] loop4: detected capacity change from 0 to 17 09:13:36 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xff0f, 0x7fff) [ 578.133470][T18882] loop1: detected capacity change from 0 to 17 09:13:38 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:38 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:38 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x7fffff, 0x7fff) 09:13:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x20000, 0x7fff) 09:13:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x20000, 0x7fff) 09:13:38 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0x1f}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 579.578719][T18905] loop3: detected capacity change from 0 to 17 [ 579.611548][T18909] loop4: detected capacity change from 0 to 17 [ 579.637742][T18910] loop1: detected capacity change from 0 to 17 09:13:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xc3046, 0x7fff) 09:13:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x1000000, 0x7fff) 09:13:38 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1000000, 0x7fff) [ 580.149733][T18936] loop1: detected capacity change from 0 to 17 [ 580.168312][T18938] loop4: detected capacity change from 0 to 17 09:13:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x2000000, 0x7fff) [ 580.288411][T18947] loop3: detected capacity change from 0 to 17 09:13:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1000000, 0x7fff) 09:13:39 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 580.609779][T18961] loop1: detected capacity change from 0 to 17 [ 580.921866][T18973] loop4: detected capacity change from 0 to 17 09:13:39 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56}, 0x28, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:39 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1000800, 0x7fff) 09:13:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3000000, 0x7fff) 09:13:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x2000000, 0x7fff) [ 581.283095][T18987] loop1: detected capacity change from 0 to 17 09:13:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4000000, 0x7fff) [ 581.435955][T18994] loop4: detected capacity change from 0 to 17 [ 581.497588][T18997] loop3: detected capacity change from 0 to 17 [ 581.611464][T19007] loop1: detected capacity change from 0 to 17 09:13:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4000000, 0x7fff) 09:13:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x3000000, 0x7fff) 09:13:40 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7000000, 0x7fff) 09:13:40 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x2000000, 0x7fff) 09:13:40 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x0, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 582.052835][T19028] loop1: detected capacity change from 0 to 17 [ 582.087421][T19031] loop3: detected capacity change from 0 to 17 [ 582.090925][T19034] loop4: detected capacity change from 0 to 17 09:13:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x8000000, 0x7fff) 09:13:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x4000000, 0x7fff) [ 582.223285][T19045] loop5: detected capacity change from 0 to 17 09:13:41 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3000000, 0x7fff) 09:13:41 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 582.380386][T19060] loop1: detected capacity change from 0 to 17 09:13:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x9000000, 0x7fff) [ 582.479890][T19069] loop4: detected capacity change from 0 to 17 [ 582.542259][T19074] loop3: detected capacity change from 0 to 17 09:13:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x6000000, 0x7fff) [ 582.734253][T19084] loop1: detected capacity change from 0 to 17 09:13:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xa080000, 0x7fff) 09:13:41 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:41 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3ddfc36, 0x7fff) 09:13:41 executing program 5: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0xfffffffffffffd89, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x30397cfbeca4eaa6, &(0x7f0000000080)=[{&(0x7f0000000040)="e00c030029000305d25a80648c63940d0424fc60100011290a210000013582c137153e370848018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) setpgid(0x0, r4) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c0000", @ANYRES16=r3, @ANYBLOB="05000300563219ae0151d1062e64b8a91cdc815b87eaa3a9d54ff1872c87811bfe608bbb2c5f9adca60ffdce4296a88ee0", @ANYRES32=r5, @ANYBLOB="9e79d8bc8bb881fab29b65c87707e26af04267c39461a3242348996a760fc47a39a9708329edd31f5ad4c7bb1ec880fd34de511f827b87265b5bcbc91b422359db02e1a00e23a00f3e979a1838d70843cc6c3dc558c1ea72676d76997325f81e4bbbf2353c68e3eea76bebc6a88c812b8882a6b203d5f0b72d0590ca0123e08a6e04bdd44864cf5400b08332d8f327c2c8e87730a2f452f10b0d3fe22414aa7c8c1933a105e96fbcad560f09c0463fcfa8e46859aa95d391f9ff"], 0x1c}}, 0x0) fcntl$setflags(r2, 0x2, 0x1) msgctl$MSG_INFO(0x0, 0xc, 0x0) fcntl$setpipe(r1, 0x407, 0x3610) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="180000005600020028bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="239fad3756a5dc32e603d9b84066b0226b0ca4fc1839789377d087bd09bea9e909d7b3fa03053af4d8e35d008168cc65"], 0x18}, 0x1, 0x0, 0x0, 0x814}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r6, 0x0, 0x4000000000010046) [ 583.185587][T19098] loop4: detected capacity change from 0 to 17 [ 583.341162][T19108] loop1: detected capacity change from 0 to 17 09:13:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x7000000, 0x7fff) [ 583.472904][T19115] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 583.473966][T19114] loop3: detected capacity change from 0 to 17 [ 583.481913][T19115] netlink: 181428 bytes leftover after parsing attributes in process `syz-executor.5'. [ 583.654484][T19136] loop4: detected capacity change from 0 to 17 [ 583.898396][T19115] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 583.918365][T19115] netlink: 181428 bytes leftover after parsing attributes in process `syz-executor.5'. 09:13:42 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x4000000, 0x7fff) 09:13:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xa080000, 0x7fff) 09:13:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xd000000, 0x7fff) 09:13:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x8000000, 0x7fff) 09:13:42 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x0, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:42 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 584.105465][T19164] loop4: detected capacity change from 0 to 17 [ 584.134050][T19167] loop3: detected capacity change from 0 to 17 [ 584.153154][T19171] loop1: detected capacity change from 0 to 17 [ 584.167891][T19174] loop5: detected capacity change from 0 to 17 09:13:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9000000, 0x7fff) 09:13:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xe000000, 0x7fff) 09:13:43 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x40, 0x0, 0x800, 0x70bd27, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x9, 0x6d}}}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1a}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x40084, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000001c0)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000140)=0x9, 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "2be0382850fe9a8a", "2d1e956f1e389c707be51ac9c7c8fdbfc0a0d12dff7bdfaa354d9be86a7b360b", "c391b0ad", "adac58fe402e03a0"}, 0x38) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10012, r5, 0x0) sendto$inet6(r2, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 09:13:43 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x5000000, 0x7fff) [ 584.505233][T19198] loop4: detected capacity change from 0 to 17 [ 584.562274][T19205] loop1: detected capacity change from 0 to 17 09:13:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xc000000, 0x7fff) [ 584.649835][T19212] loop3: detected capacity change from 0 to 17 09:13:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x10000000, 0x7fff) [ 584.798522][T19225] loop4: detected capacity change from 0 to 17 [ 584.930515][T19235] loop1: detected capacity change from 0 to 17 09:13:44 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x0, 0x3, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xd000000, 0x7fff) 09:13:44 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x7000000, 0x7fff) 09:13:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x10030000, 0x7fff) 09:13:44 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:44 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000009300)=[{{0x0, 0x0, &(0x7f0000006180)=[{&(0x7f0000005fc0)='*', 0x1}], 0x1}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xfffffdef, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0xaa, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/sockstat\x00') sendmmsg(r1, &(0x7f0000002b00)=[{{&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000400)=[{&(0x7f0000000240)="c0faa4a9a20570f79b5d388e989c1194532ef5f8ae0c5b6a5bd2216cd21e23d2538bc33cc0fad6865ce206446b5288d3f9", 0x31}, {&(0x7f0000000280)="4622ac02e49723861622f55d17f57b26162579c3693b4a1b5b328e353194304f5fcc2ff4fdfb554eccb004a60310170261200a54d6cb69a77202cba3c99a6de0f6614a9b0e88a2963f14b42849db51f4ff674865cd9f608111f1dd04e753bb8daeeaa04bd0176152950f2295cadd04e5fc2e1a50f28d12597e57e3307667adfbbab42acc", 0x84}, {&(0x7f0000000340)="c52623e63f2ebd8a015ad566b798379894022234b5a477eb6c8bd672d573a44df5dd9326edeabbbbd19ad7f5dbae72c902c050519488d0c18265f3b9035069b517ab0539b742cbd33112fa04e2ed90d505148807dc4472b89a477e4eb345bf77a61637a6a4a9bb982690d58eb19906400b29b48c05be1e4a85156151cc", 0x7d}, {&(0x7f00000003c0)="b274d5cb1f0cc49e873e4f115e8d2beb5b986b62947ad7f4d7c1bece4fcf7153cb2e8ffa02fec9a86105ba2a33", 0x2d}], 0x4}}, {{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000440)="2280fc20abfd8f31dd2760b6658d4cc354064690184e00b524446204ff87312d2abbcbfb85d66daed0bdc9b3b4", 0x2d}, {&(0x7f0000000480)="0162cc77ac56149595716b58c237935af7c7ac8046b1c49241a68aacd944541fafb0c26084e6183a0f29cd191d2f31d19bf0d2041c8f161734756c8f8e32f1d1c7c8bbf0a0be26d063e9e9547f867d7040848cdfe25c8d0447f103f9d3916ec650752a56a4690526e62f90835d4ecd478ccce2049936cfd2ea91365674d8992393d066a8a8a9d9", 0x87}, {&(0x7f0000000540)="398457ce91073e1ffab37e547480e3c65c9336f211b822e201ed1eca8e722ea69a88b7e0a4972a3d9cc14126faa9d21747d7f83dc79d238e1e8097dc32b669ac0800ec683f234d31f3c1566e61258506f43ef605b3b880ae4439e0a6d3158ec02ea521b81520bd679ecad73afb029abb68e81b217d8f452037f111aa5031180c08e40ee65b79b896921cd67886089290c7b924723b395d07dfafe166bc18690d0f311fdc0ff7e94a1ea356e531b44897cb635832e45a1a7742c70384d87be5d4d5eea18010f6b81b84499e8b5f71a07b4b3bea8ea8133a1d8872db1176ddf7d5045c782a759f3db72226105994d16079ad56a980350d", 0xf6}, {&(0x7f0000000640)="e45e6f9d866a212aca58960c4fc70bbcd3337e1baf2be5442e62eaf57ef2fadacb4d56494f2f56905f548744a641f3a48353118392c2985cb234bc195cd9f510ced33c2bdc9662ed4deb8045a4e19547b9c8162be6fb29", 0x57}, {&(0x7f00000006c0)="230fe3cd08ca1a522bfc13bf8c460068aa92b9769ff8c94e42f7a067d2ede019f683352c81052609264b5a90c5a7c480868411091c150eb3d079a000895fd3139ee05e77823ef42191a2badc65b4ae490aa05eba59278aac70989940c9c375be6b9f64fe2fda36f1569b55f9aa9ccbeb8a5f0f15e572c79e7132a839ae8789bbe40712588492309fb320f4e30cd40d737de8a0dae79ecf249fa3b7838182dea0cc4a244fff17a60d2993a3fb2e92ca85db52d1fd484d73737486d2fbd6b1b8fd4a67d41783fb5d92594e7f991539c3b4e05a36027fd9bd28da5a9141324f64f1c34e941b6b4948ed583869c1521bb9010103a529bbfaa904a20e156eccb8612585a3d874483eef62a2ce6cdc34ae7b7da72a4d02c8bb486ec6ace0da1c207df37a62b59b788d1793dcb42646025ba4c0be8dad73c942474c03cf1d71d89d9f024824a7a0289dacebe586e24c08894c3c53c12d8f6b43946282b628c0d1a3abb4fdc2200dfe9208317f86275a6e6ee42dd48c5ccb9dfab270ed5935116193b7ed6819a42f4cd78471eea24bb54193966f175dc0a8eba069a826bbb384abc5f97faeb745a8ba967f35e0b80cc593b3a1bab0c4336f6da36e8c3fdddb3bc791ebfc69356c483f0f51f74cf06ca6d0c552380d401fef9ccc9ae8f1cbeffbe45123525df395548bf1b5ce9eb85166468fc88f66628b4c3d9159a2812a98e26ea8c53a360e79ef81a05919a1297837989710f731d46be3311b716d7e51fa512063106573261d47dd93099eb716dc366a7b74043720a4a840fbe029166e76bea3b48f61d91b67a38397158377df667f5e25882047ec063de8e165c217cb820c71b7a06f4b368f36598595c05f9576b507d10b5646b639c006c8e14b291feef9474e88dbb109b9ddd1c303d8bc48eafbb826143e717a23c0445b8b54ea8ea2d51515a7345075d542e7dfc1fb4be09818395a0f04200d719fcf4542f0ce7af8d68908710d5914c36349a495c52794d686d7927c765c784b52bb07adc32af42a1b2e5a8037401f98a482cc6c4d08e5affbcff2c4a13afece7df25b165472563bd3e9242f95d98bb18b64e39f83352525c675392ea18c070cc23df513cd9f74254fe950945b5e05eceedf8eaecbbcfdeb108ae418f0c0a9299c219abce3f948570f86ce6d3752cc3b0ff188e939618030c9da5cb590647f45239d2d9bb8928d4d3238bf4a0dc31f614f7bd744079183a8b7baec35489a993957f2a1f35c6d3f6f92d584c486b9fc52b14d1d5cbd004f66f054ec0f47695f7c8220191007a8d9b9c39858285c62191a4b5df04771dbcddbab5e6152faf67d0440867b4144b174a169bce40e0cc7401a7032d876c277f5d467456d354599b6e0605dfb14821f5ca638198f7fe58f00a7982940789c6575aa6bafc5ca979500c88344eb759209bc6a5bc1c872735880a688137291f60d7f1bcf868adee0590dfa1f2ed36fde601160ec58613598d6f9504cd28eec60be0c1af6153b89a29b7ef588ba79779f96abf8d061ae3676e456fdb48ed6695a9b4baf9d9e4e5dd499de1878a14b2b6b63f9639f72a097ec9fde6ec7c3f6463de10bc4e6ca49b77ce22e03936aed44c2598bd4c91acb52a86eb7e116ebfb40aa724a75da0e4a88fba65da492ad2d46732c770e0aa5e44de963d0020019359c87e60f5918e8207870496957022cc3b35f3d5dda4c63ffd19e3186b45dc51c3ca0da2829a83ac83a55c30001203914239fe265ef1bb5cd49e74f5294b22461d4d0ca0a575f5e2dcdf15fb2c1ecf4b495632b084abf8156fa1a0d6a43af6206e6c072a1d5a3b5d1cd9281ca2076cd56625f700655a4d7f89738f51d7044c3c39997733698387fd5d79210224b0c537f511755e82748509573c9c23322775426c6808545a7c8c2264f7174b2d3f010a42bdbb0d71e98c2cee3375f4b697d5c41ce619088c0d9d8a14124f3aca0abbcd7c4e6b1065aad365fa41582ce1ce22219b800c0449b5fad33bc1252975402b1a7df39f3ca59fba97b81dbc7e16c961b9667a7f35d40e9665b75b268a9f3a02eb5ed2f15344192d8332e3c90abb8d3da70ca45e2e514943998476b376adda7ffb879aae04abaff2dfe4ef35115b24e3e95d223ef49554408c515b246ccd4b4cb34687daa84cdf0b8878a300a7afd1fdd3b26703106b4a920d351f09811aaca2ba44b9835140a9188c4dd94d39b3b534f4419da55446d9a120d3e31efd57ece40d846b9f3196eb2c8ffba6693b8ba744ccc1cb78dff54d60d1a2d08ca8ab76762cab8cf3cefa06891359aa8f21b3ae662a19b385acba6a522a1ae3d445a6b9850cc1f2f73f175193a0e39181d44f8723aa93783f3ccfc70e9bf0140937757d65b99b84facb814fd0ee4a9a0684f4ce2d81a017b84a268f74a074f1bb9e05a0ee24601caa157fcb389fe471490d770b69775f2cf3ada1a0bdb8fb0106b933e23c01f3323d0b7af2f608b41b5231881c8a33f63ebf45525c849b6faf450f6a75f7c8408fe9afe53fb2855ae798348ccedea68bc4f8c049db61030f7d499627c2ae2919b63ce0b5317a8f17182774c6f70e7674525c05fbc445ac219a195d4bc746772e4fb3f446023685bf48d838387a23015a911c34b79cde095f01a1954a5ae29e13047bfd8bed52d08343a730d391a6d498b2b70119356395ec71b731392083dc5000b3eb0707e9dbad9a45bb59e2f5ce96392650b2af5ee11a04a3a68504cf28cc08c6b1a154c055c89c373b6efacfc21193e955381d7235e561e523c405c8603f6b153a33a2ac62d3eaf67235db74fb0a792536130d454cb223bc131832c8e5c5ca4d59588516b7fa432df8776603c791ff3686c175d621c9e944d771b326f827956b64d51ce44cb91c2d6bd8dc3f6e32cfb5cdbe8ba569d08172277e9fba2d897d184ce9675e93f6d887f5235579badd67e48e39f8cb0f05da9ec54f36e28601225707b5ee943a8b66bb74722fa093996d444958968e87e0e3b5a583853d699935496913c31556ac6fb94167482ea5052614e7381dea97ef9cc4c1ed864beb9e2c03f7ba21b1a17f29ab7ae66e14d569f5650ab4b828cdcebc979d984df08a2a257abd4bdf2f4a9783302f4dd9c190f434e8bc0f123673365534d2b1d5176b5f1552d36bc120cbd0648398d22a2fd213c507dfa485dcb746b8309d2bbae846ee01a83c97b6ae28ee3407fbaa4bdd6c5df4f71d10571106cbf38aa365ed1faf5c8ccac7d6925410bbc07e49a5af44d71fefdf91e459bd593e64aa231cc6f09f8adce53588f72b89eb298ee932d807095a7d1ab9eda71049950d81bbe75f676ced1a635f8130018f1a681c16e1c96ae8c4c067b9544a89f3e9d07615fa79e7f123831d29890b2be96f79283264522bb92e81f5833474c614d3f605d1141571385b3216ca18b2ad01a007019bb8ebfcc04dfa31ffcc0fcde34b9876f7323ce543152de9ab1cfb4de80696f4c017bb5f4b1b466a324a29e88e5c39188a7a3077e4a5603264a951e2b9c6ed86187458b9b01e06267c18cf570d4d97a5bcb966067fe2d7a01ed78e618a518c639a8011798e7014626aebe697c83d81ea9d007964a97514b6a861e0ace993033ef99e25bf313335e202d548d83982a0e4324f7e1f7432351a034490cc914424d6d00e81c20b18a0130832de43ddbd973ca71c0bbddcc3a7c6633f045f1a9cc2f5f911fb16f96c239124d55751cb686f4f8dda08c1927e30254cc638873310073c4ee229e82ab0e950dba52e74fc6ad1a096d22e8fa52636ceeeea9318cced5bfb29268dc05e903fc040c2e3b1a2dc3edc40d2ab71fde294f1e7ee604a5949f70cf916e2d08ea0697732419b733ecbbc3c78555524e88054af8df55f7094ee057a8fd2a8e57d1aba477a8283e9d2469baf639eb03447dc120dd09dca70d636f9028c2ade3b706547e264d7005c2036f929fbe8709ba3b3fad1ae4a0b313f5b6db13866d20a58ee5dd0b5ba9863e34ed7d5e0ceb5811e5696194dc3f614b8ae0639c66c6f5023494a14ce991158135974b2029ae6c8b00cc0ecaabee0f72211c592e6e2f9681bc1cab4e6ba501b2b1e27666be6319a738626eb67c729781d8be6a8e53d1edfe1825dc219a68391c5a7ba3a5915e2c96307961ed9c2c0b85025f9cad37ee927ea1230f0bc960aecbdca7f17e2789deabd68f39f4170c462dc1ae855be1a3d9436ce5a5e563268642429c01cf7630ed3f411cd82f04d6d84e2a7e3fea0da710e437a85e7e402cb74448ae3d68e9543d130af2184602d2f9599d94827684f9b8082321e11c9e06bbdbc6ebde044c9101150ae5ef2ff5014e862c73bb941b737cbb6ea1e2d2bd822998d6873f82b68eeb6bfc920b27a17ad422ac0c4e05a497865af147d02320d2b03524043c2f32c72df430ae958fc5d0aabb9afbd1f4224146548c46f2bc89146b934a3fc5293505792dd30886316d76749ae2e4d110491a572ddb96829b0b09f62fabe7028e8634c8312169c6116aa6324d5ea7e9a38ead7edd2131aae41a806ae65e76290d6df3cb5fb91e8a43fb0e5158970b06839dd9f9746d0fa287498d28fdb3b5a762fc6ebd01266e397249eb99b742b661f0f114b3994dd6299382ec269ffc4488ad0df6a26248a4964c2771b8861a0861d0d1c65a261706f724753eed261d8b598fa13c199632723f5f02a2ac507b36ba70727999eb1ba1591449ad343b42f03a41e96dc204c1b99ac228b58b77782e2f3cac44e6bc16a109b450e017f98b670388f1a8db041b1225da00c7df14a5b52dfedc157e3448aed5e2ffca93ae2a2c9b8f7c2cfc81933961d75d3c28604a25524c9656aa0713b013e1dbf3b4a8886043defba22b3c963c2a5fdb6c54800f0f8368547c37fcc5c2b6b0a37f2767e5aac81252fb387eaa30fc55d32af38b02b8a4983c0474887b646df5e8fcc0023a0e72c5e6b78131d7dbc61ff9e00f01bc1d43fb33ea6cd526038fd4da8208f333e55bf24e1eabe313aec4c5c08d7128fe98f2bf9b9f74448658af5fadd63c942d0b86885aaf7230b651fa0f31bb6baed5a3e73a337a7f857cd757a38589e4efec7c0530a05fb8db08f4d15dea21fc5fba82db47e9fa52f9ac1f37daeedff9d426b6971991ea58f0af2fe80c86493ab58d0ede8881a9b0ff25fc2fc3e0bba3a6ff83b9798fdd2a881938ddcbe44d50c021e6c1b603f8e76a23760b1e5986d5ffe889a809da81c1a79a1fd8b55bb01661b4d665e87682fc1d8466604b318ca279844c3fb530827067ab5b517b804d3ac163b69eea54994fc5c49ced866a3ebe3ecbc8e1da9db63147900196da6b5c97a3e70c1ebbdf3ee55cc85a77d129ef0fbae8beabca2ffc1b8e3fec15fa7a0dcf669b1c89e9a0ccfbcd15bd93df462b73d09f28a65fb267ff2d62109bab6efe2ed3a0348e24625324df4059d8449c5ab91f637d06e3a8f17ba6f3b549a08f1e4026a54d6cf74554f905b13187534910c1f9a4422fe83d8b5c9a9d436c5f4ba76614dc878768e0eb1070f7a6545d4a74705740e69d7fc49a40e271655b32668d0b1edcb9f32cf229c9462a724c2778198992b15b27ab24c5fda924bd3833d3e5fe4e2d17c6554ec03ed848a3d3289573a9a1c9b85e56905287182fa940601311a0472eb24a1ccbaeb7b915813e514514fb65eefe461b16501be3fe26744ac2929f08631e14773048be44f8a4e371ce20041f032beb1a5d0a7b7b99f3b9533d7d701fca6c27004666f9e051f59db879a274b511632fdbe4d94aa6fd1112660a3ab6768844c0", 0x1000}], 0x5, &(0x7f0000002c00)=ANY=[@ANYBLOB="c0000000000000001f000000c01f0000838a24239711730c0140ba15f1370cb476f748e0bb39bf919601ca88b2cfe2f34da31935883c931f6210e118521cc7c2f2b58519b62345fb2721d1fa441fbcb9c908e1bb4a7cf89ae2ea948cab04d23afcd03649757843148ca310a576bfaac85b972713cdba2504c531583fa7b1ee0730b05972cf2837b0a740df004051ad145e6d211bb6b79fcae82bdafaf637d0f1f34c229f96d41c4bb0b54913febb3f5a0a44cdd1989187910c28000000000000980000000000000013010000ff070000b9f66913619d5927ffe2f93febdfe0f7f56b09225783b7cda53ca3711d05b464d86bb04e8474349e0f42eb977ca5c878823e691e5d99956e7f7d28aa71e03fd2e87500ced9b3c03f4d5632d7a1c234664433e872a736e8a3068fbf7d0431f3fdad9095ebe08711be4cc947553e73548bd9e738f6b43287e032f38ef81118635bdcc80000000000004800000000000000130100000600000052dfd2d686c3010bcac276eb1272036a97fffb71224507da2fe885b1b603c14f1a470a6e1c854475e19c02115ded35bae3ce79e296ac8c00c000000000000000070100000008000027d59459be141e03c33c61433e1bc53c28298678725bd90f11a741fc933e18b3cfe6bf9f586276af38ca38fc37f9eeb2cb864b7154c0a3b3257157a8225952fd7f2726a7b625ed053a70e3267af4b732011a52d7b1cb65d490189d36b7355a0e44d0dca153e14fa558da6623609a7892e15fd614611b2ce42e3cd8410f85151f325331b05ae9b90e30c9f4fb2c77f7a7a5a80f11c071d0b9d2b7bc5edbad5f782acb141da71b5adb21037202f9120000ae32991c2f3a69ebdcaf8442f2d727acc3c44201448d754ecfc2a6501eee32308e45d411ec51cdbcdefb8901d88cede76658029288bec7f1c7e371bde383780c00681f537c0ba83918d7c16728efa8867d8387cd6a6a88046bb2d1b815e9925f064d0172a4a65bc8ffcbb0c6b3d20cfdf8926e51143de240a02aa6bc9b1087fa6712842fd20d0630a53fefc55f46b5f00e040fc572cd20a7f6d7"], 0x260}}, {{&(0x7f00000019c0)=@ethernet={0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001a40)="3b3bd8df89189595fc278d2e116f7e2386c2f0202091652cfa0a30d581c900b3870ffd936be404aa904eef6b0a0d", 0x2e}, {&(0x7f0000001a80)="6e46646017da9c4ae0a7b2f12822913f1f224a99fedc8c1b514b1e2b1f70774353a0ca0896765d1475643ab46b3e121c830150cfbb703a94ba51e66df4eb84d1b0a11e6126d269ac916bbedb0336f2b234c0e405d286b616447409b41ff20ed3901fe43d0b62d7729d934d071e65028cfbdf638fcf72a77b8406f3a0cc62e8c942da4195b03e377da0bc5d149e563f28c3b8860c2e1ed180fb65f51728bf3ad2b26c70dcd505986d4a7dab0b7d13bf5f44e60557e2faa7f6575228f0ac", 0xbd}, {&(0x7f0000001b40)="05b5ef49a0809bac6af3e11302423ebe9bd72395088e203b3b3090647f7bfca0e371c1828fa755130158802cbeff130f664902df6d5aac82397d8561", 0x3c}, {&(0x7f0000001b80)="a93b4185749ed893a3a26652c7e7d6af7f30a48396bd3876d39cc0798878eb239c09e19835ab70dff7b35147904d657751733c267bbe9938", 0x38}, {&(0x7f0000001bc0)="6fa8d1f18287fd1f03612ca9a5f57888cbc804a178b3e3f4f2360bbb2df7a85f4de54422841ab8ae0107c8e5f746eaf39cdf4978b123f194e3209f4fa1f337d9bc778d96d85e660af00b6fcc05e69338d6d95f6bba4a3ff2120bcdac75306b5388e46010aaffcc76def763d7412bd3f8e51d3dcf7560c0b8a6e1c0fb808d247c7ec55d55c58ac418761df518b1dd516697f8cd4d5d5f8bab0dcab0c4e13625fdd840ea16a35aeb80065f6e499ea5505b63e4962fd6e559f1a28a778bd4", 0xbd}, {&(0x7f0000001c80)="fe283bd0bf85df201bb99bcb3559e2b1a7517578595403176288e7a0d1a544e3801f05d798d3e2875ebc8320d1e42f9bfbc19ca7265f74e96ab1ca416d0784e262b60f71eb3942945cb7e0eb9442de043f39a884799185918be865d73af4e4e393d9cafd5fe6f947550911a7050e9e5a517507d661a33c0247ffe454014992091ebb4fc0bc04c4bb9c7996fd631658728e27b59fb25c5fb6d9ac7ba960c0387aa5cac4e43d6aec5d", 0xa8}, {&(0x7f0000001d40)="3759069b292e8c1b52c3dfc0b07cb07e19ed86a0ddad040f4ca20680a4f5b244976e1d2071839c2b60e1c06a28a8458f9c9336e44406635ab517a039cc40be08e84181f3821176962a3f6613718c347e40ca9a0b46728ba3d0018852cacd779010f81e4ab5b47c3cfb2f046be478feb442c28dac0aa2545bf3b45e09f3600309824c3c9825f78261439634aa051d664ba35b0c15c0007a3d98480ad0366cfa591f546f5f050e21b6238052834473c9128c6dcdbf64659aeae02db5d30b0529c0f97adc5b37aa7aaf7a7d8f8a7ddd1242887ba2ce18e3c9612b726b85d4", 0xdd}, {&(0x7f0000001e40)="c44bb49ada9a6c21c6113040ea365a13cfaa92d3c71a5f193727b07b62180655219ed9480343a96b3c97205fde945ff40b2e0266e90f73aea06c7c8dc2b844967660d7793cbcf67dc06f949a64c49401e58ba6f7dce8103303be48cb5a3317119583276eba1d65cf150056924cd70e6a", 0x70}, {&(0x7f0000001ec0)="d47c67728741290bddf169ef0bc06c9d92f063af5a1931c241f8ab8d73119d1d9ac97b12d10186f41ce1026d16662013f343036fa2b952400917bd11c8eab971397166e299059e81b4b1658bb0e949ac6878a496a9147da1fb73c1e3862dec5e175d2e4af176a860729ffe0f9547e6507e67b5db12443531cc3593ecc9919ebfc0db56b051484d5f16e93a6033136cab3ecada7f71888ae755f0860235ddcbd096fd90a9dd0c0054c49da21746", 0xad}, {&(0x7f0000001f80)="961200c3e392c9ad41064a7edd8f1583bcdcdd0ea6ca239168b4e8a607fa19cd5cb75f17491043a97ed4c29c9997c0f2e198f70bb639c5334f36de5b9164fbe31885049eb0e65f1effa507afc17255bba11484e2490c80edb4e785b546c485b4d7030882c44b20eabb59a1e708f9460c7a3ff473fbfd1fb26636abef25e22fbe8e1e66a672b2c2f01d", 0x89}], 0xa, &(0x7f0000002100)=[{0xa0, 0x11, 0x20, "0c4ad5c5f9096bacf44be8fd0cd86cb1f240e5e4cc7b8354f3da044767ab9dcf6cc8ea51f47e4b3714ccd96b45217a1345ea9db25257d5925a21bc11cfc7a23e242d389c6f16cd37e5b75eb8f3e87cf865335085048f20816b3e441717b9925b1ec1eadf22894c2ad6a51f47cc5e5f84983867b4a3b375d0edfcaceba411489cb846300a77576c70ba67568c"}, {0xf8, 0x118, 0xfff, "e64081c142bc7cc97db6c83260e44c5bcc7b0419d2c86a051e8691f12a3cf6cfab33e51ed6d897db8017ab5cd05f4b9ebfe5bef01ee12ddfcc494679c074c6eb9ee676b72331c7aeac739e385e69d1bf48373572346b91b9162acaacd4b088269b772f9aaa31fb8d4a51dc39278dd00bbe756075732510edd8e4593f4412b740285cbd6f3f35e34aa25b30f1a438181644568a5f61986ddec818565e62919be60090deaa6dcb1697f54758b419726ac9d65e905ecb2207ac55e13e0087288806a84c9af7bd916931a9cbbf006f4d3c88fa0fd4ee2c955b8dcedfa4700d0fe8648804f011be74bed1"}, {0xd0, 0x1, 0xffffffff, "2fd94314d24c33f99c15172c4c1017a8d4d683719748a6fb3e9a2ddbb2c0bff249cda4d1b903b9fd102cb5e3585d24e225d31c2ea3c09dd7993bc58de1abf6c9b19f86d8e2cb9588ece6e3087a9cf365bb42729594b5ef4d74da4223a3fdfdc0c767db46836f1037cf1e5bb2584042ecacf99fe1f0f4865c10d094a1ac9f16e0810a4ffa3251009dac7d4872204357aa82f313c5d45d999f04c9c78e4331df82ba60209fa3444339eaeb44935639c9865c804ad41474077b40924f2a046737"}, {0x88, 0x10f, 0x3ff, "c2c37cbcb51825ae14f72aa7380af3d47d529049a6d029435c718faf8b7bf3a12f63fe573b9ac965c756b93198ef5846fd3162703633388804bcc1499953d11d5e15f4b4a787d21767420be9a20f6a4dfce4aac80b9051cee9a5e7ceaa8a5f1c9919f7d8d7abdc28c292a4e3db865d578b8878a5f040"}, {0xa0, 0x84, 0x1c, "969adaf93c3e1f12d50ce059569d6fd0297c8916f080db5bdf1dd011c2286325bf407d433058fc4ba2701c1b79282d5c5915b416ffbd6882e6b198079f3fd591bdecb818e5d011deaed1fdf71b0758de34768bb0d2df0e1ad75a14cbb56575bae802b4810ecd13427ca2a2bbab8dca8cabfdf1ee3a61ffdf20dc2cc9b8eaa23401e28258bd0685395501ef2ec134"}, {0xc8, 0x1f3, 0x3, "74e5b7a28154c49409e686ed5db8d308a72edfac17942a8b3f478e0f0cdd0249d07d4b1475620bbe9bf3bda5537fc98f7e6d49810c70ca9870f6487ea2869dfa8278b464e83df8c7e817a8ede6046c066af7a13715f0ea6fc2df9079896365ff567b4bae0671cc8f024556614ec6731d0e0e8b520c7222f886a3ae8779fd520d8887c982571eb8feec75e82317080d2215e95cb548b29cd1ffd286513f7fe8d044a27e05597fec5e9481ebcc5a6e8b3ef0c89b"}], 0x458}}, {{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002580)}, {&(0x7f00000025c0)="44f0b8fd456794fe684b3456ee5863727bb0698fc8923c23794cc0fe6e03cd0d7858f790cf2a55853b31acc06a658ab81482ecd153f05886d7017e37a1e2788fcd7522eeeee7e491f06fb511", 0x4c}, {&(0x7f0000002640)="b891bae9fc531829fbdb6b3f09285f205073ba381edcbca2e728572679b644afc55f6a0cbd7e2c992576d3188281", 0x2e}], 0x3, &(0x7f00000026c0)=[{0x28, 0x11, 0x9, "639e15c286922572b0e056f40863f064309af64b15ff"}, {0x48, 0x0, 0x10001, "6df34101afbc9ced03133c94485a42e9ee18390a09d6988b85501974f51cdc6ff46b4e7792094e20f62d6f972ce17ed497"}, {0xa0, 0x110, 0x9, "4091cf10f35d884a2b4280044085abacf347e58ef9111e0f82673568c87d10da71b348f50e7e7067ccc8cd06a97e21c3741b395df77f527d22b3f9f499e7c4ddde9395683a269b6027232c6ef64e37ac3c36d4394c0040f648a4cd9ad2a165ce0757d4f99a3ef9c1ac055925f5cdfd02bceb053a6b77c53216bb453cf8c9665aa69d7d27ea96f3ebcc4e64a87380"}, {0xb8, 0x111, 0x101, "e2c3c9c40466ee266501dab6b88362a83595b7ff9bc702dd04d8979ceed2871b012624c50e9689b8b5f93a807c3873b8fd897601ad6dc766fa918879fb024edeb1066c6a4f27b2f75419dddcabbd8d89d36517f9ced126e5bfb44d653deaf0fd3004d199aa9258d524a866eb40f453c567ca4e2d86dea3307c3fd3d3ee01d48fa77f5abbd05ab3641374913e677f5e48db5376d60863e6e3d5407bb12cf7e0ca1adb8e3147a31a"}, {0x98, 0x101, 0x858, "447a26913067670daded9fa60cfdb399cd3d06bb2332cdcdeb0c51b6300c8b9a3c0c35a20fb5f931e145059cbe566b5d62fb6a08205b29c3da38aec724d4048a0589d3f25e7c95ee6400642445f5779dd661d7f470158b44ee118d3294b316b91d8a3df0a59ca3bc2f4851d8cb23839ee42db8729315290ecaa7634105fd7a3cef0971"}, {0x10, 0x84, 0x4}, {0x38, 0x10f, 0xff, "c162b8ea6f859903749e850fd69a3c4c2418f92e4b098d91bf8b3d485ec910eccf0f63ae105ac5a1"}, {0xc0, 0x104, 0x7, "79aeacc715efb1912b95836df865a20ea7fd62a978728834e066d8c7f07d5802bf4535e600a38aea193bd1bca0dfd0fc11a8cf50da286f590ff600b012850cf5a124c4ef58d8301fab4c835e45c184eb491d44ebdd6d73871ff8899b75adc07e971d336a98ae0ed3a367d48c20d617a46517da7c41fceca7bbbebcc967e41d685a98a2314e8b2490923b44af4a1298ac2dbc15cb3b36b65acd67557c8824e212e940db9d7ddb4daafd"}, {0x10, 0x108, 0x7fff}, {0xb8, 0x88, 0x0, "ef1ce35414856d1a10d6649c42ce6658ea3f6cd8a145d968457bb43489fff29b0387e98d53bfafcd4d8ee64ba454949d8f16e0fab7e273eb108ad2d6685b2bc638b63f401be975f81a5e093a467ca5c0a93a0228a8ca63ce639797ffd295aa5cf72785da0e6605fb5b9af760a799176218b60cab72d1f0a1baeeead47b4ef8b4f5a477940f442eedd7235e24878fb6b5883575f8b3f12c67d89f050854b9f9259860da5bac6b"}], 0x430}}], 0x4, 0x801) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) syz_io_uring_setup(0xe5f, &(0x7f0000001740)={0x0, 0xc5eb, 0x4, 0x0, 0x36b, 0x0, r1}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000017c0), &(0x7f0000001800)=0x0) r4 = syz_io_uring_setup(0x356f, &(0x7f0000000240)={0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000004000/0x2000)=nil, &(0x7f0000000140), &(0x7f00000001c0)) io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0x13, 0x20000000, r5) syz_io_uring_submit(0x0, r3, &(0x7f0000001880)=@IORING_OP_TIMEOUT={0xb, 0x5, 0x0, 0x0, 0x6, &(0x7f0000001840)={0x0, 0x989680}, 0x1, 0x0, 0x0, {0x0, r5}}, 0x7) sendto$inet6(r2, &(0x7f0000000040)="cbbec2d8a156f6cbe64aab306a789739ca8af0b908efb28a46543812553f9e1dbfff5b9ba8a9d50c0717811234c773c8981330b55b5e04dfd5299042197d1ed9f91093fa2e11d3d28aeafce6dac089637cf5aa6d0953d9a9547c5cf0f1187592821f33e26e478757fb14534b3295245de424f0c966abf5269b4060e4fd4bd432e1a341ccc7642755971fc6ebd6c8cb7f4bf8d6eb5d85e55d93869f690badb5b0a346918dbc41cebdd458f59eefae93131778b4529afaf11476af3190a0dc1996a123278bf22c521654860a8ead76fee0a185e2e79f332d2b401aa73722415314a039c604bdd8e5af49c69ed2", 0xec, 0x80, &(0x7f0000000140)={0xa, 0x4e21, 0x3ff, @private0={0xfc, 0x0, '\x00', 0x1}, 0x4}, 0x1c) [ 585.893133][T19260] loop3: detected capacity change from 0 to 17 [ 585.917695][T19263] loop1: detected capacity change from 0 to 17 [ 585.961530][T19266] loop4: detected capacity change from 0 to 17 09:13:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x1f000000, 0x7fff) 09:13:44 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x8000000, 0x7fff) 09:13:44 executing program 5: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8e1c, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x8, 0x3, 0x5, 0x7, 0x0, 0x7ff, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x2826, 0x3b2}, 0x5912, 0xaec7, 0x20, 0x2, 0xcc, 0x6, 0x423, 0x0, 0x7, 0x0, 0x5}, r2, 0x2, r0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x4000010, &(0x7f0000000340)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000001000c00d00002000400000026010000000000000602000000000000b501000000000000ee0100000000000099000000000000003e010000000000008501000000000000a30100000000000078da2baeacca4eccc9492d2aa61d030085492b1f78da2baeacca4eccc9492d2a1e658c324619a30c1803005565c4a273797a6b616c6c657273a30078da636278cbc8c0c0c83051363d1ec8604800e2ff4000a41852805804889990d43003f925486aa4581818a4813433c37fb81aa01003c82c3520d62fc92dd02faeacd2cdcc4d4c4f4d4fcd3331b434373733b634d24fcbcc493580908c48363031400088d604627620e644926705f2fba16ab81850012392cba0f28cc87ad9806233a1721acaa87a9990f4229b0131f700dc0c76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd010000000000000100000000000000dc01", 0x200}], 0x0, &(0x7f00000003c0)=ANY=[]) flistxattr(r5, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@loopback, @private}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'gre0\x00', 0x0}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x48, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'hsr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl0\x00', r7, 0x2f, 0x5, 0x3f, 0x4, 0x1, @empty, @private2, 0x8, 0x700, 0x0, 0xfffffff7}}) 09:13:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xd070000, 0x7fff) [ 586.397873][T19299] loop1: detected capacity change from 0 to 17 [ 586.406195][T19300] loop4: detected capacity change from 0 to 17 09:13:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xe000000, 0x7fff) 09:13:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x20060000, 0x7fff) [ 586.489421][T19307] loop3: detected capacity change from 0 to 17 [ 586.775702][T19298] loop5: detected capacity change from 0 to 1 [ 586.871990][T19330] loop4: detected capacity change from 0 to 17 [ 586.924944][T19333] loop1: detected capacity change from 0 to 17 09:13:46 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x0, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:46 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x8030000, 0x7fff) 09:13:46 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x10000000, 0x7fff) 09:13:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x26010000, 0x7fff) [ 587.457944][T19355] loop4: detected capacity change from 0 to 17 [ 587.462529][T19354] loop1: detected capacity change from 0 to 17 [ 587.509089][T19360] loop3: detected capacity change from 0 to 17 09:13:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x12000000, 0x7fff) 09:13:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x30090000, 0x7fff) [ 587.843260][T19378] loop4: detected capacity change from 0 to 17 [ 587.904581][T19383] loop1: detected capacity change from 0 to 17 [ 588.782516][T19400] loop5: detected capacity change from 0 to 1 09:13:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x15040000, 0x7fff) 09:13:48 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x9000000, 0x7fff) 09:13:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x36040000, 0x7fff) 09:13:48 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:48 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x0, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:48 executing program 5: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8e1c, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x8, 0x3, 0x5, 0x7, 0x0, 0x7ff, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x2826, 0x3b2}, 0x5912, 0xaec7, 0x20, 0x2, 0xcc, 0x6, 0x423, 0x0, 0x7, 0x0, 0x5}, r2, 0x2, r0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x4000010, &(0x7f0000000340)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f00000003c0)=ANY=[]) flistxattr(r5, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@loopback, @private}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'gre0\x00', 0x0}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x48, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'hsr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl0\x00', r7, 0x2f, 0x5, 0x3f, 0x4, 0x1, @empty, @private2, 0x8, 0x700, 0x0, 0xfffffff7}}) [ 589.696613][T19413] loop4: detected capacity change from 0 to 17 [ 589.715166][T19415] loop1: detected capacity change from 0 to 17 [ 589.734964][T19417] loop3: detected capacity change from 0 to 17 09:13:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3f000000, 0x7fff) 09:13:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1d010000, 0x7fff) 09:13:48 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xd000000, 0x7fff) [ 590.210171][T19444] loop1: detected capacity change from 0 to 17 [ 590.221891][T19443] loop4: detected capacity change from 0 to 17 [ 590.338057][T19451] loop3: detected capacity change from 0 to 17 09:13:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x40000000, 0x7fff) 09:13:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1f000000, 0x7fff) 09:13:49 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 590.844038][T19478] loop1: detected capacity change from 0 to 17 [ 590.864674][T19476] loop4: detected capacity change from 0 to 17 [ 591.576274][T19426] loop5: detected capacity change from 0 to 1 09:13:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3f000000, 0x7fff) 09:13:52 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xf073335, 0x7fff) 09:13:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x41000000, 0x7fff) 09:13:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x32050000, 0x7fff) 09:13:52 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ffd}], 0x1, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:52 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x0, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 593.580782][T19505] loop4: detected capacity change from 0 to 17 [ 593.612987][T19507] loop1: detected capacity change from 0 to 17 [ 593.621228][T19508] loop3: detected capacity change from 0 to 17 09:13:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x44000000, 0x7fff) 09:13:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x3a020000, 0x7fff) [ 593.748957][T19516] loop5: detected capacity change from 0 to 17 09:13:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3f000000, 0x7fff) [ 593.956709][ T26] audit: type=1800 audit(1638782032.715:34): pid=19519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.3" name="file0" dev="sda1" ino=15776 res=0 errno=0 09:13:52 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfffffff, 0x7fff) [ 594.120490][T19539] loop4: detected capacity change from 0 to 17 [ 594.149029][T19543] loop1: detected capacity change from 0 to 17 09:13:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x46070000, 0x7fff) 09:13:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x3f000000, 0x7fff) [ 594.274158][T19550] loop5: detected capacity change from 0 to 17 [ 594.286510][T19551] loop3: detected capacity change from 0 to 17 09:13:53 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), 0xffffffffffffffff) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00000001c0)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "2be0382850fe9a8a", "2d1e956f1e389c707be51ac9c7c8fdbfc0a0d12dff7bdfaa354d9be86a7b360b", "c391b0ad", "adac58fe402e03a0"}, 0x38) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10012, r3, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 09:13:53 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ffd}], 0x1, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:53 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x10000000, 0x7fff) [ 594.486932][T19565] loop1: detected capacity change from 0 to 17 [ 594.535212][T19574] loop4: detected capacity change from 0 to 17 09:13:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x47000000, 0x7fff) 09:13:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x40000000, 0x7fff) [ 594.805409][T19594] loop3: detected capacity change from 0 to 17 [ 594.839158][T19597] loop1: detected capacity change from 0 to 17 [ 594.920100][T19602] loop4: detected capacity change from 0 to 17 09:13:54 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:54 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x10060000, 0x7fff) 09:13:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4a000000, 0x7fff) 09:13:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x46300c00, 0x7fff) 09:13:54 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ffd}], 0x1, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 595.697534][T19630] loop4: detected capacity change from 0 to 17 [ 595.708719][T19632] loop3: detected capacity change from 0 to 17 [ 595.721113][T19634] loop1: detected capacity change from 0 to 17 09:13:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4c020000, 0x7fff) 09:13:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x4f060000, 0x7fff) [ 596.098591][T19658] loop4: detected capacity change from 0 to 17 [ 596.171195][T19663] loop1: detected capacity change from 0 to 17 09:13:55 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x18090000, 0x7fff) 09:13:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x57030000, 0x7fff) 09:13:55 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x0, 0x7ff, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4d000000, 0x7fff) [ 596.491469][T19679] loop4: detected capacity change from 0 to 17 [ 596.512050][T19682] loop3: detected capacity change from 0 to 17 09:13:55 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 596.676908][T19679] loop4: detected capacity change from 0 to 17 [ 596.710607][T19692] loop1: detected capacity change from 0 to 17 [ 596.933996][T19682] loop3: detected capacity change from 0 to 17 09:13:55 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x5f000000, 0x7fff) 09:13:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x50000000, 0x7fff) 09:13:55 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1b316933, 0x7fff) [ 597.174446][T19720] loop1: detected capacity change from 0 to 17 09:13:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x53000000, 0x7fff) [ 597.278563][T19728] loop4: detected capacity change from 0 to 17 [ 597.318302][T19731] loop3: detected capacity change from 0 to 17 09:13:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x74040000, 0x7fff) 09:13:56 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1f000000, 0x7fff) [ 597.584531][T19750] loop1: detected capacity change from 0 to 17 09:13:56 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x56000000, 0x7fff) [ 597.730257][T19758] loop4: detected capacity change from 0 to 17 [ 597.840626][T19762] loop3: detected capacity change from 0 to 17 [ 598.079476][T19776] loop1: detected capacity change from 0 to 17 09:13:57 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x20000000, 0x7fff) 09:13:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x7c010000, 0x7fff) 09:13:57 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 599.094378][T19798] loop3: detected capacity change from 0 to 17 [ 599.097482][T19797] loop4: detected capacity change from 0 to 17 09:13:58 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x59000000, 0x7fff) 09:13:58 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:58 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x81000000, 0x7fff) 09:13:58 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x23010000, 0x7fff) [ 599.565819][T19823] loop3: detected capacity change from 0 to 17 [ 599.598090][T19825] loop4: detected capacity change from 0 to 17 [ 599.612265][T19826] loop1: detected capacity change from 0 to 17 09:13:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x84000000, 0x7fff) 09:13:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5c000000, 0x7fff) 09:13:58 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:58 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x2b040000, 0x7fff) [ 600.214309][T19854] loop4: detected capacity change from 0 to 17 [ 600.241348][T19856] loop1: detected capacity change from 0 to 17 09:13:59 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x91050000, 0x7fff) [ 600.435269][T19867] loop3: detected capacity change from 0 to 17 [ 600.841144][T19883] loop4: detected capacity change from 0 to 17 09:13:59 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x0, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:13:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x95000000, 0x7fff) 09:13:59 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:13:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5c050000, 0x7fff) 09:13:59 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x33070000, 0x7fff) [ 601.289776][T19903] loop3: detected capacity change from 0 to 17 [ 601.300675][T19902] loop4: detected capacity change from 0 to 17 [ 601.300753][T19904] loop1: detected capacity change from 0 to 17 09:14:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x98000000, 0x7fff) 09:14:00 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 601.467693][T19904] loop1: detected capacity change from 0 to 17 09:14:00 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:00 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3369311b, 0x7fff) 09:14:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5f000000, 0x7fff) [ 601.852792][T19939] loop4: detected capacity change from 0 to 17 09:14:00 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 602.025601][T19946] loop1: detected capacity change from 0 to 17 09:14:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x99020000, 0x7fff) [ 602.066566][T19947] loop3: detected capacity change from 0 to 17 [ 602.529676][T19967] loop4: detected capacity change from 0 to 17 09:14:01 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x0, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x62000000, 0x7fff) 09:14:01 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3401cdc2, 0x7fff) 09:14:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9b000000, 0x7fff) 09:14:01 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ffd}], 0x1, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:01 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 603.082202][T19985] loop4: detected capacity change from 0 to 17 [ 603.104174][T19987] loop1: detected capacity change from 0 to 17 [ 603.119727][T19991] loop3: detected capacity change from 0 to 17 09:14:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x65000000, 0x7fff) 09:14:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9e000000, 0x7fff) 09:14:02 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ffd}], 0x1, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:02 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x349a6a6a, 0x7fff) [ 603.616236][T20020] loop1: detected capacity change from 0 to 17 [ 603.653177][T20022] loop4: detected capacity change from 0 to 17 09:14:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x68000000, 0x7fff) [ 603.848553][T20032] loop3: detected capacity change from 0 to 17 09:14:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xa1000000, 0x7fff) [ 604.084686][T20045] loop1: detected capacity change from 0 to 17 [ 604.102701][T20049] loop4: detected capacity change from 0 to 17 09:14:03 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x0, 0x8001, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:03 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ffd}], 0x1, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:03 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500), 0x0, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6b000000, 0x7fff) 09:14:03 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3533070f, 0x7fff) 09:14:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xa4000000, 0x7fff) 09:14:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) set_tid_address(0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000040)={0x2, 0x0, 0x0, {0x0, 0xe7ffffff}}) splice(r0, &(0x7f0000000040)=0x1, r1, &(0x7f0000000140)=0x100, 0xbd8f, 0x8) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x1000, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x8942, 0x0) splice(0xffffffffffffffff, 0x0, r2, &(0x7f00000001c0)=0x8, 0x800, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000025ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef010001000000d7f465", 0x43, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="21a17e05d44890283cbc8aa607e01db686eedb13a9b9457482acb58073d5492c9a9348cecd0e6e67341c7da1b9a997398a93c2b675c28f417d47707522baa38b1477217c096b817842ea697404a03f177a9dc81a835a661eb93ee04b4e72ee66719ef2d82b29a2a31b31fd55c4942fa31a144fa321b8c6c91f5887982c8a022b7b4c46ad3f1f3bc2a65fee0f9c91b1b0e543554569977fa12dc558b8ed3384217bac98c7a57070fc296b56"]) [ 604.805623][T20072] loop3: detected capacity change from 0 to 17 [ 604.809954][T20074] loop4: detected capacity change from 0 to 17 [ 604.837277][T20077] loop1: detected capacity change from 0 to 17 09:14:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xa7000000, 0x7fff) 09:14:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6c080000, 0x7fff) [ 605.107677][T20096] loop4: detected capacity change from 0 to 17 [ 605.143800][T20091] loop5: detected capacity change from 0 to 131456 09:14:04 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x35cba3b7, 0x7fff) 09:14:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xaa000000, 0x7fff) [ 605.234516][T20109] loop1: detected capacity change from 0 to 17 09:14:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6e000000, 0x7fff) [ 605.383715][T20091] EXT4-fs (loop5): Unrecognized mount option "!¡~ÔH(<¼Š¦à¶†îÛ©¹Et‚¬µ€sÕI" or missing value [ 605.425889][T20119] loop4: detected capacity change from 0 to 17 [ 605.468970][T20121] loop3: detected capacity change from 0 to 17 [ 605.575576][T20135] loop1: detected capacity change from 0 to 17 09:14:05 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x0, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xad000000, 0x7fff) 09:14:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknodat(0xffffffffffffff9c, 0x0, 0x21c0, 0x103) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file2\x00', 0x1000, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000040)={0x2, 0x0, 0x0, {0x0, 0xe7ffffff}}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x26667000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000001840)=0x2000000) symlinkat(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, 0x0) landlock_create_ruleset(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0, 0x0) 09:14:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x72030000, 0x7fff) 09:14:05 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x36fcdd03, 0x7fff) 09:14:05 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500), 0x0, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 606.401171][T20162] loop3: detected capacity change from 0 to 17 [ 606.441846][T20165] loop1: detected capacity change from 0 to 17 [ 606.492326][T20168] loop4: detected capacity change from 0 to 17 09:14:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x78000000, 0x7fff) 09:14:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xae060000, 0x7fff) 09:14:05 executing program 5: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x1) ioctl$TIOCEXCL(r0, 0x540c) socketpair(0x26, 0x6, 0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000480)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000280)=""/157, 0x9d}, {&(0x7f0000000340)=""/101, 0x65}], 0x3, &(0x7f0000000400)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x10060) r6 = getgid() fchown(r3, r4, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000500)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) accept4$unix(r7, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e, 0x80800) ioctl$TIOCL_SETVESABLANK(r3, 0x541c, &(0x7f0000000600)) ioctl$FAT_IOCTL_GET_VOLUME_ID(r1, 0x80047213, &(0x7f0000000640)) fsetxattr$trusted_overlay_nlink(r5, &(0x7f0000000680), &(0x7f00000006c0)={'U+', 0x1000}, 0x16, 0x1) r8 = dup(r3) fallocate(r8, 0x43, 0xffffffffffffff30, 0x7169) syz_mount_image$ntfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x9, 0x4, &(0x7f0000001980)=[{&(0x7f0000000780)="cca419a5a7c4bb75e2ab8a09bf3fe12c31a4ecddf9b9fdbf414cac7ee183c9ec277163af649bf08c26acf7637c3a0e2c55265aca7a935f377ba95ce60279b5497a0f99621c43dc9b0e1503643a9de174833bf2147a6b59e92381c721f55d5045488f02681af9c2861da9f3b7c4992f0abbfea8a6c3600c6101285d8af5019c77fbc32e719659137e81d4e07b2d470a121179a860e55f7607a266f935e8e1ca340988a85b7485cea5ca74f58011c39bd4", 0xb0, 0x4}, {&(0x7f0000000840)="daa266f240ee527200c5ec25b76b5f700b79b8366a3451469cef978ccf46", 0x1e, 0x6}, {&(0x7f0000000880)="ce729b3d615107ec3662451eb8d4ca36d20fa86bf3001e22f45ed3276e8fc156ca2afc63fc15986339f4714295eaa49c3cab3af16cfaa622b281fb1279740cf0df5f49ea1a58e1587ebb0e0eb95365119b43c6162fb92ad3301911e2acdf74c7981d42ed495e11d8b9130133f2060b35e6eb8613e686a63a09b8d49cf42846facc7cdfc1df1264f6b2eaa5bea6bd3ab71dab99e0872a40118a8d929f3eae42364a492ea19273940bf42801ce471ddc31dbc6bddaf0c1a09f4268e44674aa256b0bd7f072a9f3e5957af719367117ded0ca2dd1e0ff4759e8ffa529043a3f6612a7c2ecf04c4c", 0xe6, 0x6}, {&(0x7f0000000980)="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", 0x1000, 0x8}], 0x4000, &(0x7f0000001a00)={[{@case_sensitive_yes}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@errors_continue}, {@fmask={'fmask', 0x3d, 0xff}}, {@disable_sparse_yes}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000001ac0)={0xffff, 0xbf, 0xe403, 0x6, 0x2}) setsockopt$bt_BT_CHANNEL_POLICY(r8, 0x112, 0xa, &(0x7f0000001b00), 0x4) syz_mount_image$hpfs(&(0x7f0000001b40), &(0x7f0000001b80)='./file0\x00', 0x20, 0xa, &(0x7f0000002000)=[{&(0x7f0000001bc0)="1bf7afc28b769d4ad20fd4b36cf87723765a5ffc1f3ec8b7dd814a2fef87cb0edc1d9f75fdd3c9bdaa70e3cd85cfbffd5f64a3e31498c520f0cea00813cbe2ba4de141db29ce7b1130fdc614391a2a0b4a0a08d9900e", 0x56, 0x5}, {&(0x7f0000001c40), 0x0, 0x100000001}, {&(0x7f0000001c80)="67cecf0b4036a6e51771ba595ef04c7f51b2231143e7d5144b534642697dcd9010645e1bd1e5a18c42966c6df254234dc63b0e28860e3141ad98cc76777b442a572034250e9158fc5fb47b66213b7daeb646c88b0e425b1aafb37c02ab1b1dd037aa96e63a5edae495cd309ce04b302e9f1f2ffbbffc31a6b7950254ec05", 0x7e, 0x10000}, {&(0x7f0000001d00)="1a2fe76be8724e9b6e836ef31d9e276ab6c88048948c2c3c8e2c498aaffb7ba1e8da3e4eb9e2cd621667a12fcf3d8a7a10df96d0493a1ba41f37e20dbcacbc565d69a5ef4943b10a4ead517143a5aa15a4edc873cd5db30bad0b5a39", 0x5c, 0x2}, {&(0x7f0000001d80)="a8e2a8164486634bbbbe153d2602112a4b141c98e3427769e2227278e2b355eb7f876ac506c030", 0x27, 0x7fffffff}, {&(0x7f0000001dc0)="4f35932a77439316d79e82d32f7fa5cca15b705ea3c341b5be3c5bf340591c5f12b51a0db6e1dc5f461fafad754d699008167ed2a0e271287dce801e09724b1c1a337d4a60c6b2c89538efc10e31cee73a23acedd45966cfce77d909199378bbdc2574465be40a0170c4317e6768", 0x6e, 0x7f}, {&(0x7f0000001e40)="b4df2667a6096ee027664d4ad7513fc73827b3b7457666cb9b1e548dad87f5bb2b7eb72c87c2fe157caffec3a393c67d9de3b1c216257685b417d417292c4b03fc050c4a837d60c6bab9ab34353369f5b86b9c38b6195896a76b9d98dca420c98bc0850c067a54c4a21f57a5338de1d1355a907282359e268785aa103cd7abfa54ea2c526100aec232091efc6899d07edaad3c35f336a85d05d3f318a8c23d6483e578a7969f1239f3aee2369a2c1fd4", 0xb0, 0x2}, {&(0x7f0000001f00)="65666a1b8fab1b18d932c1b0fc0e1c387f5be9122cd95107b04034be05270420e406767823c9cab178d6d9d920c5d559851429a3a1797de5bdc5eaa05c7a955c29e529ce7a979322201829f7d363c01500e7852d052c736fd1e4daedb8c0a268235c8d8788c885088590", 0x6a, 0x8}, {&(0x7f0000001f80)="489eca70ab7ebfa05212b916076c57cc45188f4af3d132e5ad", 0x19, 0x100}, {&(0x7f0000001fc0)="03da5b095b1257c9", 0x8}], 0x20028, &(0x7f0000002100)={[{'errors=continue'}], [{@smackfstransmute}, {@dont_appraise}, {@smackfsroot={'smackfsroot', 0x3d, 'trusted.overlay.opaque\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/ocfs2_control\x00'}}, {@dont_measure}, {@appraise}, {@fowner_gt={'fowner>', r4}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise}]}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000002280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) 09:14:05 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3b0a0000, 0x7fff) [ 606.772088][T20193] loop1: detected capacity change from 0 to 17 [ 606.849651][T20201] loop4: detected capacity change from 0 to 17 09:14:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7b000000, 0x7fff) [ 606.902006][T20205] loop5: detected capacity change from 0 to 8 [ 606.926136][T20207] loop3: detected capacity change from 0 to 17 [ 606.959022][T20205] ntfs: (device loop5): parse_options(): Unrecognized mount option mask. 09:14:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb0000000, 0x7fff) [ 607.021736][T20205] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 607.089111][T20219] loop1: detected capacity change from 0 to 17 [ 607.102046][T20212] loop5: detected capacity change from 0 to 8 [ 607.109327][T20212] ntfs: (device loop5): parse_options(): Unrecognized mount option mask. [ 607.161537][T20212] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 607.280359][T20236] loop4: detected capacity change from 0 to 17 09:14:06 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x0, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7e000000, 0x7fff) 09:14:06 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3f000000, 0x7fff) 09:14:06 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500), 0x0, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:06 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500), 0x0, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb3000000, 0x7fff) [ 608.207316][T20261] loop3: detected capacity change from 0 to 17 [ 608.209894][T20263] loop4: detected capacity change from 0 to 17 [ 608.247491][T20266] loop1: detected capacity change from 0 to 17 [ 608.259113][T10482] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 09:14:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb6000000, 0x7fff) 09:14:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x81000000, 0x7fff) 09:14:07 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500), 0x0, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:07 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x46020000, 0x7fff) [ 608.669382][T20289] loop1: detected capacity change from 0 to 17 [ 608.696756][T20294] loop4: detected capacity change from 0 to 17 09:14:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb6030000, 0x7fff) 09:14:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x82060000, 0x7fff) [ 608.954422][T20305] loop3: detected capacity change from 0 to 17 [ 609.062882][T20314] loop4: detected capacity change from 0 to 17 [ 609.103828][T20318] loop1: detected capacity change from 0 to 17 09:14:08 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x0, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:08 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500), 0x0, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb9000000, 0x7fff) 09:14:08 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:08 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x4e050000, 0x7fff) 09:14:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x84000000, 0x7fff) [ 609.992942][T20352] loop3: detected capacity change from 0 to 17 [ 609.996224][T20351] loop1: detected capacity change from 0 to 17 [ 610.021341][T20353] loop4: detected capacity change from 0 to 17 09:14:08 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x0, 0xb36, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x88010000, 0x7fff) 09:14:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xbc000000, 0x7fff) 09:14:09 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x56080000, 0x7fff) [ 610.568602][T20384] loop1: detected capacity change from 0 to 17 09:14:09 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 610.737620][T20388] loop3: detected capacity change from 0 to 17 [ 610.745873][T20389] loop4: detected capacity change from 0 to 17 09:14:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x92090000, 0x7fff) [ 610.966371][T20406] loop1: detected capacity change from 0 to 17 09:14:10 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0x0, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xbe000000, 0x7fff) 09:14:10 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x60000000, 0x7fff) 09:14:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x98040000, 0x7fff) 09:14:10 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:10 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 612.053859][T20430] loop4: detected capacity change from 0 to 17 [ 612.077405][T20433] loop3: detected capacity change from 0 to 17 [ 612.086069][T20437] loop1: detected capacity change from 0 to 17 09:14:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xbf000000, 0x7fff) 09:14:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xa8070000, 0x7fff) 09:14:11 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 612.464496][T20459] loop4: detected capacity change from 0 to 17 09:14:11 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x61000000, 0x7fff) [ 612.557093][T20466] loop1: detected capacity change from 0 to 17 09:14:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xd3040000, 0x7fff) 09:14:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xae020000, 0x7fff) [ 612.900598][T20481] loop3: detected capacity change from 0 to 17 [ 612.930027][T20482] loop4: detected capacity change from 0 to 17 [ 612.977762][T20486] loop1: detected capacity change from 0 to 17 09:14:12 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0x0, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:12 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xb9000000, 0x7fff) 09:14:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xdb010000, 0x7fff) 09:14:12 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x69030000, 0x7fff) 09:14:12 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 614.325474][T20517] loop1: detected capacity change from 0 to 17 [ 614.344397][T20520] loop4: detected capacity change from 0 to 17 [ 614.345513][T20518] loop3: detected capacity change from 0 to 17 09:14:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xbc000000, 0x7fff) 09:14:13 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf0050000, 0x7fff) 09:14:13 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x6a6a9a34, 0x7fff) [ 614.888840][T20553] loop1: detected capacity change from 0 to 17 09:14:13 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 614.971489][T20557] loop4: detected capacity change from 0 to 17 09:14:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xbe050000, 0x7fff) [ 615.028940][T20561] loop3: detected capacity change from 0 to 17 09:14:13 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf4ffffff, 0x7fff) 09:14:13 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0x0, 0x400, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:14 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:14 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x71060000, 0x7fff) [ 615.298663][T20580] loop4: detected capacity change from 0 to 17 [ 615.303962][T20583] loop1: detected capacity change from 0 to 17 09:14:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xc0000000, 0x7fff) 09:14:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf5ffffff, 0x7fff) 09:14:14 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 615.663967][T20606] loop3: detected capacity change from 0 to 17 [ 615.664150][T20603] loop1: detected capacity change from 0 to 17 09:14:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x56df, 0xfffffffd, 0x8, 0x0, 0x0, 0x4, 0xb4}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000a40)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="83230000000000002e2f66296c6530009281bc543329dfc27124fee354d8339a81440aa9a325ee87aa8f333b0aa29b0d5dc84f745cad4f447b2626709a01443dbf9a7c0146949dd4b1bb3c9b43db31796f816637d8a448b02aa509fe04ffa50ee4974fb35a0cc133ee853d8f0bd2e88e37d01bb2b3f704452d0d546b4ab74404e48e6fc9ebc32f9ae513a86b8cd6a6d8db335671c921155bd8ebc111f14cf20bb90ff27e30f8a0157ed4ae7fed024b0f6af0ff9d8d4f3a08387df833c9a551cb26fce90b6742c2ac04d042121f1d0000e008000000ae406318ca4bcbe8e8f2005f0b92145b1a670985230d5db08203"]) perf_event_open(&(0x7f00000007c0)={0x4, 0x80, 0x9, 0x1f, 0x2, 0x5, 0x0, 0x5, 0x100, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000780), 0x13}, 0x20, 0x7fff, 0x100, 0x8, 0x7, 0x8, 0xdf4, 0x0, 0x51, 0x0, 0x1f}, 0xffffffffffffffff, 0x4, r1, 0xb) preadv(0xffffffffffffffff, &(0x7f0000000a00)=[{&(0x7f0000000840)=""/206, 0xce}], 0x1, 0x2, 0x6daa) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='uid_map\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0x2061c0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x36, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002000000e0d44fa5", 0x70, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000001c0000006a706700000000006769660000000000706e670000000000617669000000000064697678000000006d703400000000006d703300000000003367700000000000776d760000000000776d6100000000006d706567000000006d6b7600000000006d6f76000000000061737800000000006173660000000000776d78000000000073766900000000007776780000000000776d0000000000006d706700000000006d70650000000000726d0000000000006f676700000000006a70656700000000766964656f00000061706b0000000000736f000000000000636f6c64000000", 0xff, 0x860}, {&(0x7f0000010300)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0xa80}, {&(0x7f0000010400)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0xb80}, {&(0x7f0000010500)="00000000000100"/32, 0x20, 0xec0}, {&(0x7f0000010600)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002000000e0d44fa54ad64de3a0b8e58956bb7b1c00000000", 0x80, 0x1400}, {&(0x7f0000010700)="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"/279, 0x117, 0x1860}, {&(0x7f0000010900)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > ', 0xba, 0x1a80}, {&(0x7f0000010a00)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0x1b80}, {&(0x7f0000010b00)="00000000000100"/32, 0x20, 0x1ec0}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/180, 0xb4, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed70000030000000003000000003c00"/64, 0x40, 0x400fe0}, {&(0x7f0000010e00)="0000000000000000000000000000000000000000000000000000000600000000", 0x20, 0x4011e0}, {&(0x7f0000010f00), 0x0, 0x401240}, {&(0x7f0000011000)="000000000000000000000000000000000000000000000000000e000000040078", 0x20, 0x401280}, {0x0, 0x0, 0x4012e0}, {&(0x7f0000011200)="000000000000000000000000000000000000000000120000000510ec00000000", 0x20, 0x401320}, {&(0x7f0000011300)="00000014000000020c6000"/30, 0x1e, 0x401380}, {&(0x7f0000011400)="00000000000000000000000000000000000000000000030000000000000300000000000008000000000000080000000001000800000000020000000000000000", 0x40, 0x4013e0}, {&(0x7f0000011500)="8d070001000000000000009ded0000000000002000edff000000000000000000", 0x20, 0x402000}, {&(0x7f0000011700)="000000000000000000000000000000000000000000000000000000010000000005000000000000060000000000000700000000000008000000000000090000000000000800"/96, 0x60, 0x402fe0}, {&(0x7f0000011800)="00000000000000000000000000000000000000000000000000000001000000", 0x1f, 0x403fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/224, 0xe0, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}, {0x0, 0x0, 0x5feffc}, {&(0x7f0000011c00)="0000000000000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x48, 0x5ff040}, {&(0x7f0000011d00)="d63cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5000000060000000100000007000000070000000a0000004000000040000000fc0f00"/192, 0xc0, 0x600000}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000c889421e0000030000000003000000003c00"/62, 0x3e, 0x600fe0}, {&(0x7f0000011f00)="0000000000000000000000000000000000000000000000000000000600000000", 0x20, 0x6011e0}, {&(0x7f0000012000)="000000000000000000000002000000000400"/32, 0x20, 0x601240}, {&(0x7f0000012100)='\x00'/16, 0x10}, {&(0x7f0000012200)="0000000000000010000000001400"/32, 0x20, 0x6012e0}, {&(0x7f0000012300), 0x0, 0x601320}, {&(0x7f0000012500)="000000000000000000000000000000000000000000000300000000000003", 0x1e, 0x6013e0}, {&(0x7f0000012600)="03000000000000030000000000000400"/28, 0x1c, 0x602000}, {&(0x7f0000012800)="0000000000000000000000000000000000000000000000000000000100000000050000", 0x23}, {&(0x7f0000012900)="0000000000000000000000000000000000000000000000000000000100000000", 0x20, 0x603fe0}, {0x0, 0x0, 0x604fe0}, {0x0, 0x0, 0x7ff000}, {&(0x7f0000012d00)="0000000000000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/96, 0x60, 0x7ff040}, {&(0x7f0000012e00)="0000000000000000000001000000010000000002000000010000000003000000013c00000004000000023c0000000500000000380000000600000001380000000700000002380000000800000005380000000900000004380000000000000000", 0x60, 0xc00000}, {&(0x7f0000012f00)="0000000000000000000001000000010000000002000000010000000003000000013c00000004000000023c0000000500000000380000000600000001380000000700000002380000000800000003380000000900000004380000000000000000", 0x60, 0xe00000}, {&(0x7f0000013000)="ff0000000000000000000000000000000000000000000000000000000000000000000300000001000200000000030000000200024a8113ed040000000500028dcece4507000000050001baeed06f0800000005000153bfc550080000000500011200522309000000090001", 0x6b, 0x3001000}, {0x0, 0x0, 0x3800160}, {0x0, 0x0, 0x3801160}, {0x0, 0x0, 0x3801fe0}, {&(0x7f0000013b00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syzkallers\x00'/32, 0x20, 0x3802160}, {0x0}, {0x0, 0x0, 0x3804000}, {&(0x7f0000013f00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkalle', 0x5c, 0x3804160}, {&(0x7f0000014000)="0000000000000000090000000900000001000000d33cd47a0000000005380000ed8102010000000000000000020000002823000000000000040000000000000015bc645f", 0x44}, {0x0}, {&(0x7f0000014300)="ed4100005cf90100535f0100030000000010000000000000020000000000", 0x1e, 0x3c01000}, {&(0x7f0000014500)="0000000000000000030000000300000000000000d33cd47a00000000023c0000ed41", 0x22, 0x3c01fe0}], 0x0, &(0x7f0000014900)) [ 615.910991][T20621] loop5: detected capacity change from 0 to 245791 09:14:14 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x79090000, 0x7fff) 09:14:14 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x588) [ 615.963713][T20603] loop1: detected capacity change from 0 to 17 [ 616.020000][T20625] loop4: detected capacity change from 0 to 17 [ 616.048034][T20621] F2FS-fs (loop5): invalid crc_offset: 0 [ 616.105798][T20621] F2FS-fs (loop5): Disable nat_bits due to incorrect cp_ver (15564030943740312791, 0) 09:14:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xc4000000, 0x7fff) 09:14:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf8020000, 0x7fff) [ 616.336987][T20642] loop3: detected capacity change from 0 to 17 [ 616.401692][T20621] F2FS-fs (loop5): Mounted with checkpoint version = 7ad43cd7 09:14:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x56df, 0xfffffffd, 0x8, 0x0, 0x0, 0x4, 0xb4}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000a40)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="83230000000000002e2f66296c6530009281bc543329dfc27124fee354d8339a81440aa9a325ee87aa8f333b0aa29b0d5dc84f745cad4f447b2626709a01443dbf9a7c0146949dd4b1bb3c9b43db31796f816637d8a448b02aa509fe04ffa50ee4974fb35a0cc133ee853d8f0bd2e88e37d01bb2b3f704452d0d546b4ab74404e48e6fc9ebc32f9ae513a86b8cd6a6d8db335671c921155bd8ebc111f14cf20bb90ff27e30f8a0157ed4ae7fed024b0f6af0ff9d8d4f3a08387df833c9a551cb26fce90b6742c2ac04d042121f1d0000e008000000ae406318ca4bcbe8e8f2005f0b92145b1a670985230d5db08203"]) perf_event_open(&(0x7f00000007c0)={0x4, 0x80, 0x9, 0x1f, 0x2, 0x5, 0x0, 0x5, 0x100, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000780), 0x13}, 0x20, 0x7fff, 0x100, 0x8, 0x7, 0x8, 0xdf4, 0x0, 0x51, 0x0, 0x1f}, 0xffffffffffffffff, 0x4, r1, 0xb) preadv(0xffffffffffffffff, &(0x7f0000000a00)=[{&(0x7f0000000840)=""/206, 0xce}], 0x1, 0x2, 0x6daa) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='uid_map\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0x2061c0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x36, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002000000e0d44fa5", 0x70, 0x400}, {&(0x7f0000010100)="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", 0xff, 0x860}, {&(0x7f0000010300)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0xa80}, {&(0x7f0000010400)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0xb80}, {&(0x7f0000010500)="00000000000100"/32, 0x20, 0xec0}, {&(0x7f0000010600)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002000000e0d44fa54ad64de3a0b8e58956bb7b1c00000000", 0x80, 0x1400}, {&(0x7f0000010700)="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"/279, 0x117, 0x1860}, {&(0x7f0000010900)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > ', 0xba, 0x1a80}, {&(0x7f0000010a00)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0x1b80}, {&(0x7f0000010b00)="00000000000100"/32, 0x20, 0x1ec0}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/180, 0xb4, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed70000030000000003000000003c00"/64, 0x40, 0x400fe0}, {&(0x7f0000010e00)="0000000000000000000000000000000000000000000000000000000600000000", 0x20, 0x4011e0}, {&(0x7f0000010f00), 0x0, 0x401240}, {&(0x7f0000011000)="000000000000000000000000000000000000000000000000000e000000040078", 0x20, 0x401280}, {0x0, 0x0, 0x4012e0}, {&(0x7f0000011200)="000000000000000000000000000000000000000000120000000510ec00000000", 0x20, 0x401320}, {&(0x7f0000011300)="00000014000000020c6000"/30, 0x1e, 0x401380}, {&(0x7f0000011400)="00000000000000000000000000000000000000000000030000000000000300000000000008000000000000080000000001000800000000020000000000000000", 0x40, 0x4013e0}, {&(0x7f0000011500)="8d070001000000000000009ded0000000000002000edff000000000000000000", 0x20, 0x402000}, {&(0x7f0000011700)="000000000000000000000000000000000000000000000000000000010000000005000000000000060000000000000700000000000008000000000000090000000000000800"/96, 0x60, 0x402fe0}, {&(0x7f0000011800)="00000000000000000000000000000000000000000000000000000001000000", 0x1f, 0x403fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/224, 0xe0, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}, {0x0, 0x0, 0x5feffc}, {&(0x7f0000011c00)="0000000000000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x48, 0x5ff040}, {&(0x7f0000011d00)="d63cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5000000060000000100000007000000070000000a0000004000000040000000fc0f00"/192, 0xc0, 0x600000}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000c889421e0000030000000003000000003c00"/62, 0x3e, 0x600fe0}, {&(0x7f0000011f00)="0000000000000000000000000000000000000000000000000000000600000000", 0x20, 0x6011e0}, {&(0x7f0000012000)="000000000000000000000002000000000400"/32, 0x20, 0x601240}, {&(0x7f0000012100)='\x00'/16, 0x10}, {&(0x7f0000012200)="0000000000000010000000001400"/32, 0x20, 0x6012e0}, {&(0x7f0000012300), 0x0, 0x601320}, {&(0x7f0000012500)="000000000000000000000000000000000000000000000300000000000003", 0x1e, 0x6013e0}, {&(0x7f0000012600)="03000000000000030000000000000400"/28, 0x1c, 0x602000}, {&(0x7f0000012800)="0000000000000000000000000000000000000000000000000000000100000000050000", 0x23}, {&(0x7f0000012900)="0000000000000000000000000000000000000000000000000000000100000000", 0x20, 0x603fe0}, {0x0, 0x0, 0x604fe0}, {0x0, 0x0, 0x7ff000}, {&(0x7f0000012d00)="0000000000000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/96, 0x60, 0x7ff040}, {&(0x7f0000012e00)="0000000000000000000001000000010000000002000000010000000003000000013c00000004000000023c0000000500000000380000000600000001380000000700000002380000000800000005380000000900000004380000000000000000", 0x60, 0xc00000}, {&(0x7f0000012f00)="0000000000000000000001000000010000000002000000010000000003000000013c00000004000000023c0000000500000000380000000600000001380000000700000002380000000800000003380000000900000004380000000000000000", 0x60, 0xe00000}, {&(0x7f0000013000)="ff0000000000000000000000000000000000000000000000000000000000000000000300000001000200000000030000000200024a8113ed040000000500028dcece4507000000050001baeed06f0800000005000153bfc550080000000500011200522309000000090001", 0x6b, 0x3001000}, {0x0, 0x0, 0x3800160}, {0x0, 0x0, 0x3801160}, {0x0, 0x0, 0x3801fe0}, {&(0x7f0000013b00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syzkallers\x00'/32, 0x20, 0x3802160}, {0x0}, {0x0, 0x0, 0x3804000}, {&(0x7f0000013f00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkalle', 0x5c, 0x3804160}, {&(0x7f0000014000)="0000000000000000090000000900000001000000d33cd47a0000000005380000ed8102010000000000000000020000002823000000000000040000000000000015bc645f", 0x44}, {0x0}, {&(0x7f0000014300)="ed4100005cf90100535f0100030000000010000000000000020000000000", 0x1e, 0x3c01000}, {&(0x7f0000014500)="0000000000000000030000000300000000000000d33cd47a00000000023c0000ed41", 0x22, 0x3c01fe0}], 0x0, &(0x7f0000014900)) [ 616.482333][T20658] loop1: detected capacity change from 0 to 17 [ 616.615912][T20642] loop3: detected capacity change from 0 to 17 [ 616.661380][T20671] loop4: detected capacity change from 0 to 17 [ 617.247730][T20691] loop5: detected capacity change from 0 to 245791 [ 617.307680][T20691] F2FS-fs (loop5): invalid crc_offset: 0 [ 617.386393][T20691] F2FS-fs (loop5): Disable nat_bits due to incorrect cp_ver (15564030943740312791, 0) 09:14:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xce080000, 0x7fff) 09:14:16 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x588) 09:14:16 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x7f510100, 0x7fff) 09:14:16 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x0, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xfbffffff, 0x7fff) [ 617.701956][T20702] loop4: detected capacity change from 0 to 17 [ 617.719197][T20691] F2FS-fs (loop5): Mounted with checkpoint version = 7ad43cd7 09:14:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xfeffffff, 0x7fff) 09:14:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000040)="b8050000000f01c10f46a78900000066ba2100b067ee66ba2000b000ee6d2f2f800000c00f3266bac0000f3066b808008ed0660f38806f000f011c268ee0", 0x3e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4c7]}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 617.900471][T20712] loop1: detected capacity change from 0 to 17 [ 617.911911][T20710] loop3: detected capacity change from 0 to 17 09:14:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xd4030000, 0x7fff) 09:14:16 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x588) [ 618.105131][T20723] loop4: detected capacity change from 0 to 17 09:14:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xff0f0000, 0x7fff) 09:14:16 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x84010000, 0x7fff) [ 618.246802][T20733] loop1: detected capacity change from 0 to 17 09:14:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xe4060000, 0x7fff) [ 618.525096][T20748] kvm: pic: non byte read 09:14:17 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x588) [ 618.598116][T20753] loop4: detected capacity change from 0 to 17 [ 618.607009][T20752] loop3: detected capacity change from 0 to 17 [ 618.617620][T20757] loop1: detected capacity change from 0 to 17 [ 618.797750][T20753] loop4: detected capacity change from 0 to 17 09:14:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xea010000, 0x7fff) 09:14:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xffefffff, 0x7fff) [ 619.001624][T20752] loop3: detected capacity change from 0 to 17 [ 619.221493][T20795] loop1: detected capacity change from 0 to 17 [ 619.233083][T20796] loop4: detected capacity change from 0 to 17 09:14:18 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x8c040000, 0x7fff) 09:14:18 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x588) 09:14:18 executing program 5: clone(0x2000000002240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), 0x4) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7ca}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.dequeue\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x8) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000340)={0xf010000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x7, 0x4, 0x61, 0x0, 0x888b, 0x8100, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000080), 0x8}, 0xa18, 0x5, 0x8, 0xf, 0x8, 0x3, 0x81f, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0x6, r1, 0x1) mremap(&(0x7f00000c9000/0x3000)=nil, 0x3000, 0x2000, 0x6, &(0x7f0000ffb000/0x2000)=nil) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x2, 0x0, 0x4, 0x3, 0x0, 0x81, 0x4800, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000200), 0xe}, 0x110, 0xfae, 0x1, 0x4, 0x80000001, 0x4, 0x1, 0x0, 0xffff7982, 0x0, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000006c0), 0x52, 0x400fa7f, 0x753) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x3, 0x7, 0x4, 0x0, 0x29, 0x82048, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbe, 0x2, @perf_config_ext={0x6, 0x4}, 0x8040, 0x3, 0x8, 0x6, 0x4, 0x1000, 0x9, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 09:14:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xffffefff, 0x7fff) 09:14:18 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x0, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xf4ffffff, 0x7fff) [ 619.680553][T20817] loop4: detected capacity change from 0 to 17 [ 619.684517][T20818] loop3: detected capacity change from 0 to 17 [ 619.700409][T20820] loop1: detected capacity change from 0 to 17 09:14:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xf5ffffff, 0x7fff) 09:14:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xfffffff4, 0x7fff) 09:14:18 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x588) 09:14:18 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x94070000, 0x7fff) [ 620.262828][T20848] loop1: detected capacity change from 0 to 17 [ 620.403948][T20856] loop4: detected capacity change from 0 to 17 09:14:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xfa040000, 0x7fff) 09:14:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xfffffff5, 0x7fff) 09:14:19 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x588) [ 620.863952][T20879] loop3: detected capacity change from 0 to 17 09:14:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xfbffffff, 0x7fff) [ 621.005878][T20883] loop4: detected capacity change from 0 to 17 [ 621.356851][T20903] loop1: detected capacity change from 0 to 17 09:14:20 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x0, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:20 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x588) 09:14:21 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x0, 0x0, 0x3f, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:21 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xa7020000, 0x7fff) 09:14:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xfffffffb, 0x7fff) 09:14:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xfeffffff, 0x7fff) 09:14:21 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x588) [ 622.523483][T20953] loop3: detected capacity change from 0 to 17 [ 622.524816][T20954] loop4: detected capacity change from 0 to 17 [ 622.563551][T10726] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 622.568485][T20959] loop1: detected capacity change from 0 to 17 09:14:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xfffffffe, 0x7fff) 09:14:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xff0f0000, 0x7fff) 09:14:21 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:21 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xaf050000, 0x7fff) [ 623.344524][T20983] loop4: detected capacity change from 0 to 17 [ 623.446869][T20985] loop1: detected capacity change from 0 to 17 09:14:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xffffffff000, 0x7fff) [ 623.754633][T20995] loop3: detected capacity change from 0 to 17 [ 623.891559][T21002] loop4: detected capacity change from 0 to 17 [ 624.033027][ T1231] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.039509][ T1231] ieee802154 phy1 wpan1: encryption failed: -22 09:14:24 executing program 5: munlockall() unshare(0x48040200) unshare(0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x84800) r1 = openat$incfs(r0, 0x0, 0x0, 0x66) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f0000000140)=0x5b, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000004f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r2, 0xc010f508, &(0x7f0000000300)={0xbe, 0x8}) mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x5d8a4000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/power/pm_print_times', 0x400000, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0}, 0x0) r4 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @none}, 0x0, 0x800) finit_module(r4, &(0x7f00000002c0)='.pending_reads\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000a, 0x0, @perf_bp={&(0x7f0000000340)}, 0x4343c, 0x96}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFQNL_MSG_CONFIG(r1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010001b00000000000000000000a787ef05000300", @ANYRES32=0x0, @ANYBLOB="01f200000000000008001b0000000000"], 0x28}}, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000500)={0x0, 0x0, "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", "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"}) 09:14:24 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xffefffff, 0x7fff) 09:14:24 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xb7080000, 0x7fff) 09:14:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1000000000000, 0x7fff) 09:14:24 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 625.775973][T21026] loop4: detected capacity change from 0 to 17 [ 625.861195][T21028] loop1: detected capacity change from 0 to 17 [ 625.918662][T21034] loop3: detected capacity change from 0 to 17 09:14:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x2000000000000, 0x7fff) 09:14:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xffffefff, 0x7fff) 09:14:24 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:25 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xb7a3cb35, 0x7fff) [ 626.392020][T21062] loop4: detected capacity change from 0 to 17 [ 626.501537][T21067] loop1: detected capacity change from 0 to 17 09:14:25 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x7ffffffffffff, 0x7fff) [ 626.712494][T21067] loop1: detected capacity change from 0 to 17 [ 626.726270][T21092] loop3: detected capacity change from 0 to 17 [ 627.089411][T21108] loop4: detected capacity change from 0 to 17 09:14:26 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xfffffff4, 0x7fff) 09:14:26 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xc2000000, 0x7fff) 09:14:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf0ffffff0f0000, 0x7fff) 09:14:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'vxcan0\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x67, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x8, 0x2e, 0x0, 0x3, 0x106, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x10e09, 0x1e40000000, 0x9, 0x6, 0xcce9, 0x40, 0x2, 0x0, 0x7, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r3, 0x2) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x74, 0x10, 0x40b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x22b}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE={0x8, 0x2, @dev}, @IFLA_GENEVE_REMOTE={0x8, 0x2, @dev}, @IFLA_GENEVE_PORT={0x6, 0x5, 0x4e24}, @IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5, 0x9, 0x4}, @IFLA_GENEVE_TTL={0x5, 0x3, 0x5}, @IFLA_GENEVE_PORT={0x6, 0x5, 0x4e22}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_MASTER={0x8}]}, 0x74}}, 0x0) [ 628.216605][T21152] loop1: detected capacity change from 0 to 17 [ 628.232006][T21153] loop3: detected capacity change from 0 to 17 [ 628.244948][T21154] loop4: detected capacity change from 0 to 17 09:14:27 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:27 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x100000000000000, 0x7fff) 09:14:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xfffffff5, 0x7fff) 09:14:27 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xc2cd0134, 0x7fff) 09:14:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'vxcan0\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x67, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x8, 0x2e, 0x0, 0x3, 0x106, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x10e09, 0x1e40000000, 0x9, 0x6, 0xcce9, 0x40, 0x2, 0x0, 0x7, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r3, 0x2) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x74, 0x10, 0x40b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x22b}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE={0x8, 0x2, @dev}, @IFLA_GENEVE_REMOTE={0x8, 0x2, @dev}, @IFLA_GENEVE_PORT={0x6, 0x5, 0x4e24}, @IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5, 0x9, 0x4}, @IFLA_GENEVE_TTL={0x5, 0x3, 0x5}, @IFLA_GENEVE_PORT={0x6, 0x5, 0x4e22}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_MASTER={0x8}]}, 0x74}}, 0x0) [ 628.947449][T21185] loop3: detected capacity change from 0 to 17 [ 629.016335][T21190] loop4: detected capacity change from 0 to 17 [ 629.031990][T21191] loop1: detected capacity change from 0 to 17 09:14:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x200000000000000, 0x7fff) 09:14:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xfffffffb, 0x7fff) 09:14:28 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:28 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xca030000, 0x7fff) [ 629.533338][T21212] loop4: detected capacity change from 0 to 17 [ 629.702507][T21212] loop4: detected capacity change from 0 to 17 [ 629.724788][T21225] loop1: detected capacity change from 0 to 17 09:14:28 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x300000000000000, 0x7fff) [ 629.931513][T21240] loop3: detected capacity change from 0 to 17 [ 629.989111][T21246] loop4: detected capacity change from 0 to 17 09:14:29 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:29 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r1) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1718809cc4afe5d65815de44cd3068e996083ad39d562d74d505d3dc0dcbc5c18846317e2993a25e0851c11bdb5e088349e91a98a01b803a0901935f2f6ecbb78dcaabbef4bd993e57b565c686ec6cb1e863d1f7c5d1aeb253437feda83aad33e4e741e8a6902aa8d7c1", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25030000000800030003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x69b52cfae10ec4c3) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x403ffd, 0x7b, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000}, 0x40) 09:14:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xfffffffe, 0x7fff) 09:14:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x400000000000000, 0x7fff) 09:14:29 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xd2060000, 0x7fff) 09:14:29 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 631.317329][T21274] loop1: detected capacity change from 0 to 17 09:14:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xffffffff000, 0x7fff) [ 631.426020][T21281] loop4: detected capacity change from 0 to 17 [ 631.434864][T21280] loop3: detected capacity change from 0 to 17 09:14:30 executing program 5: getpgrp(0xffffffffffffffff) fork() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, 0x0, 0x0) syz_mount_image$zonefs(&(0x7f0000000a40), &(0x7f0000000a80)='.\x00', 0xe07, 0x8, &(0x7f0000000f40)=[{&(0x7f0000000ac0)="a8703e6e2df74371aebb49e8b09912b3dd72867d5239465cdbfce35d5901b74cdc6da509697a30866569ba37a47ea0b555fbe8106a0c98507b373b694ed2bf311ee648460bcbe158fe1a18353d5a591de8f7181c390048376d", 0x59, 0xb000000000000000}, {&(0x7f0000000b40)="19011a44c957a27a2610695cfeb412ef7df760f071f73a67d4135d0d09df2df656aa642e6183856653646da6025f882a400ccc5b38401d94fb3da656346a42c4c98b52e99a1da324c8af5adc7ddfd15af82f3e6e27b62e95d140e2883def5749312bee807c0f7d282665fa22b148c79a", 0x70, 0x401}, {&(0x7f0000004880)="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", 0x1000, 0x7b3}, {&(0x7f0000000bc0)="90e11beb386a50a0a907712332def3002c6ef7d2a892a8987a8d15dbad4761b34586a38af2837d49cb41e8c07c7429c9e248fa5808c2eb9f5a42da20fc356aa4cfd5098de45059d1ae2a66a160463a43877c3ed8e43596d928091fa79cdfd51c69acbe72e84ad414800c10f361d358208d12e798a7310b4be7cb441f7665f2c21cad1339c780d3526f9c4dd75e21fb3ec6cb50a9b67aaa279b865cc6b66a0a7102628bbbe741f70e377ea5ce768b73", 0xaf, 0x8}, {0x0, 0x0, 0x200}, {0x0}, {&(0x7f0000000d80)="b0e2c0efe0810ac7e37b616be09c8e3a64692e409f3407b5a33e9222a05384e21383d88417fcafaad32da367c8e404dbfa74ac7f61931533a6ae92b98e4da271040cb8cd17d1846077452247839fad8f452ccf370493650d8d213414a3fde140d40e73fe647269087f71bc730e145ead3df7cda9a8771b97cd75061b557b0f8e5095953204", 0x85, 0x8}, {&(0x7f0000000e40)="a85aed1bb14bba09068e30a27d6a94899fdb245172059c12e0c219d5bd4a2a54ad825fe79720c65c8d7fae56f6226b93549d29ec45bdb075c39679ce", 0x3c, 0x8000}], 0x10400, &(0x7f0000001040)={[{@errors_zone_offline}, {@errors_repair}, {@explicit_open}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@uid_lt={'uid<', 0xee01}}, {@uid_gt={'uid>', 0xee00}}, {@seclabel}]}) r1 = getpid() syz_open_dev$vcsa(&(0x7f0000000000), 0x8, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x8a000, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) sched_rr_get_interval(r3, &(0x7f0000000180)) write(r2, &(0x7f0000001400)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d0177d3214056250c61a537d2ec7630fb90395df2cd6aa9c5e573365db580520bdc3f1c6b2be992e1516a4b810a11935dc780699e461d9715f70c6d103ff49bf168f3cff4c0d0d6ba5671fcd2975450b0e1a3474139cb0f2d3476fcd87a8bccbeb2f5f8a821017b879aa5b9d1fafa9f4c429a74cd2da782114d97bf031746a817dd0293c4eddc3a9ecb5afe496f4971474ccd827449409f07cf94dda2e7dbe8520b5afff10a7e3b0b4289a167fc692635b5b7426d9e771b95860b09a3e752c867213c772e48ba30a78feecc7ff26e63e1749c62b52d377ac5cc52db830c965e04ccfcfb24ceacc69cfdc2094124dd27b2d68f699476a2562bab1de117ffc2b0702ee8b0b77f85fecec3a25b37ab7eb06232c9a73b4470f1727c82581d81942abf42d3ea37957927ad3dbd0ebe46678a9f4d25c47acaac83c14210a54b71fed40df017e2be27f01e3e6ea3ea381ca14efd202858e6535ad4f79a8cdf47e385b740a70c14e3651731a45cc0ca4a56f2e903cad0384efcc364caf67e09551d35c682ebc90a9286c4d274ba1b8ced742ede4e55a62db7ef9a96fde2add05b41599fd72a79ba280cc125cb266ef21b7eeafe3ee6aa78eef33fc66454549c3ec298cb683a55a32208cf6ce88b560166159d59e65f30540f62c5437652ea7f2a02f87ca242dd2250f58e75938a9a3ded51ae6598c2aba53287ff5cdaab17be7f4310f8e07e310d52778de79e1c2e4391b254be38910aa1cf6e1ca0e75d24be97d59f7025f16c6fbd549529b74e319c58f50438765ef0e3dc394eeb75dec41b3d80435b17520c97f5cd7ee692fb86d188fb0089fbf737dc1b96b9cc49be23a38a8cd92e5075f349993d7866369dd25eccbe1481477a05fee14e0edd1617921d7fcaa8fdc642e63b64388fa5b63442ff1466b1938d02546750b01ed9c980282ccbe10f204741249aed88c555ed6fdf7f68af9209807a71bbf4f31bef5a4223466da74ba8b034df529aef6ec6610a0d25973961e50e02af22d0ca8be1b9804a5918acbdb536e8f2f441ec9d640ed15133ee747440c86fc4526c9195954528673d25c8390170f3c19cb0b0c30b9e634c7ebae96946ae97c19eabca92226da925d22be37abbe0740938ea899ec42fd529a3b1063981e4c154219df5cf5af60a29b5a8ee530905725a14b28900eae937e705401ba8f632a7bca00d9724a992afdc9ed14aac71b8e3a7ee5ca095888feb195b4e083c3b611a1c2f8d092febe3b9f5f0df61e8d3c31a643c935b76bc1ad4265164e755484beb06610510bc51e8c6da8d71123bbe83a5e4128f41cf5c486d6a60496c300c406f990bee485cbdef794f2663ee66d2b18d8e55210c25c04b1a0c6d9c5f904e72806d2d4f5e5439bcdf146343cdffe4d0d70d42a9959cff9bd50c37cd478b0b0add16aae4dc839b46bca2ac7547144b6a422aed5e2db661bcb31a82bc0fc678e71a6cb090ef772860f3008b4152b5d281033be4a77b367baec3ab8ce7c83c601b11c8199bafcd15161a5454a6a982dbc3c2e3a5172b6a63e4904817075754eccbb0188c9cb2e5da9600f567485014887463b40f189b7ec3c5c0f36d502509e402c285765c78417ce6b3aab130ee79622dcd8ada842233e73a14554ee5e4995e32b3fe4075e247eb9bdeef64d1a7436c9b5782fb2f84f74e4c6e976289729c37b5bb8200a9480d181a6b11f5ec229b818134b8334967ae935ac1d81be4776fae4cb68b6fa330e93bd8de388b38455d569159bcd166df030a6dfedf28caf4608de7243f5df2c76f6680c301d819dc67d24d2f780432a931700a253b0a5b075195c6dbfd1fe17a1c11a3dffa872a07b877adc66d069fffb6d8326e1998c5a337c3d530250cae335ceffcf81dc438a47e73490d050a053813dbe6674e42c91ae94b4a88144f36adc1b08b4bcd6ddf4058c4e08d4dc83d5fbd843ee27eaf50b297c220350260d9abbeeb6deb921e50cae0ea590cfb6f00fb3c71520f565bb769705e2481ef27cf537d29f163c9fe3d39ed9fd18dc8b0c976cd302283e430807a9d751357f89092532d89fe280c69ad36e3541b5da9dea13fd19d0434c760fe295dfd9b9e63453c7853914c50b1b77ccd4b33c8b1f31fcb1aec040ffe2f9d728d8ea84297bac2e22230ebd1488c503b05b2e433cc37ce9fc123b7d3eb244b4549e9a841e73b664c8f6621ea5a4c9ff9c1da032255311f2c063a682baf4c97e7ba552bf71af4bd64f43872b846d15c65c487089be272cfa24a33f8c50930ea0bc4b089505fb8e97ded0e7e64a5ce897da6b940df4c3dddb8b4871d773f6ebf02058518c55c19aadb0f266caf18777ae68d2bfcfb2225961fcd10538ba664fd053a443320072707533ab761b9397bd0559126b84fe9196463ae50633017ea2d80940311d9c867102b1017f34af1965d8eb61be616a0d40656e2bbb750aee6f74f788c8acb2578e8686f5f8da6a19e979c152b7ee7c7f16902120588e2ff630144b5f929ffc593e946d9717c5968aa16c2d73d689fb5cce117acda3e23e5e0116de1cb6bddfa1a84cefb22c1e2c3753017696f27b9aec5d44f15411247643b84dd4410e784b4eb5b9c68fea671976f9b51c6526e2ddb40659611b0b3bcc7e249c77396fdb8c864ea9318f9de7fd3936fcbdc732c2f8b9556ec9afeb15d5e2df890351d66074d53dddc6e8dba8c91d733623ac95a49eb69c7de37ff2364ccddb01f6500750a012c2acf32a9f6bbd9e92d17ef858fbc34575db414ea42ad87a65b11ae5506469db256c421328f45aec73bdf18562447dc2840bbe9fc84dedd0fe6276fa174f21210d40193530ec7a70a9e60bfd6b00cba4d483be59950f16fa0dbd089b5fd0bb078badfcf42270cc62fe37be22b0d81f755263d74636fa466d2574ca62b58c649936d21e949de73ea45df3acade6609413f56fc218d6f11947bf1fd629d38d8acce90ee3c1a51117601ae126bec537e3e76ce7ecc53cfeefee8aaa104aa853a65aadf27bac9849ee0122793b11cd8e4f32fb07afa39e439cb738c30a6df958160aac15c26032a61aaf614b2e6601581fb0ab8d115e045005dee3df8ea42643cbcbb0b111130c42c94b7e874cfee50d5c2eb13b3a38c417fce9d740b7d43120431a7d44bc3934ee87b112401cbee3553837b6a0b4b3faaceb46eca4064301c8060870350e256ac9d5557f674536b9d9717a82fa211e7dfb52ca410d8a4f2f6b733c2a082f247538a6c40f56cf64204e62515db692f32733ff6f4b0787ef305d5e80881375467ae603ac3600e688c42f89a4fea4fdda09a8d59e19457c654a98c8129a8c65bae3310af2b170729e18400c915d0a2f4c4fc51747846630b95ec181228bda7ef48ad389815aa82de6c4a3b0746c28c01f9ec697ff17f095e1cf9d2fe78fdab9cbb1ca7aefc8af6a0cd98444735fad79e394a8f9c2fd358c3cde4ca6d57a620d0bb52dc6ff93f034b596f407c21511cc2c5ec8b0ede7f5c0acca61939ac7f2cad820c15133e69507eaa739e9a88936f4a74f0ad1574a1591f31f582a76157d89805cb3ba5e8d10509bf7a08e928653b4f05ba797a06765b74c8759fc34178624c08a2b99e59bcff5d33af2b0f9176b56c35f4da31c751a4c2fd88a1997cd9fc9bbf78220731d4c8cea23be1fd29c36b34d8458b7021ebcfafdc7e54096e517da3eb684298f742532d776164d9c9658e5faca0a3b08afca1bc27ed357884f49fe51bd0c38057f4288f1917e36e3865310b5eed140aef6150ae363293cf7467abd5e06cd7af5e2c49e7c5253a1155741e380bccb023a0faed93d9a64512d72436f1ef4ac0904a413e45164c23413bd57274a0a951c41a9a43aed094d4ea5c480ce64663cc9d36723179e2b19a48e9277a6591bbd888a06e0f2f142cd4495be4ba7274d69ba32a2788b935b2f18c5f336cb9de062829e2e0bb476efb36c3f53a766c14314f31637a464ac59d378ad7f51bef8d88715613653a427038e0d3e4dc3948bb1d70eb55c91c92f7510b1c0387253b458d2c90d17238f9eb239c680179a6c1e0759be367963e3b4d7395fd3911626582a094e6a8d0e746242f94267a4c57d5b2360ce3a6f7f3e3c10e124a54ed24d1585bc7b731cf731c94ee00ebf070b999b9bf28d76bfec9dcf12fcce2b9c4444c706ec6b943b5f39e9151a764ba1cd0cd6c1c7cdc3aa824cf17da705be27a18fbee41be39d6ae4dd4312f5f4bfee2c5bb21d941666f9d79b0f80c9b1bace84a05d2b0e3be1c3fd04d72b4b0124595c435813969d413960fddc858730a433383f3bc0472cb7683ea569e001f00"/3584, 0xe00) fallocate(r2, 0x11, 0x0, 0xfffc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x11f88) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000200)={r2, 0x20, 0x7fffffff}) 09:14:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x600000000000000, 0x7fff) 09:14:30 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:30 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xda090000, 0x7fff) [ 631.838091][T21307] loop4: detected capacity change from 0 to 17 [ 631.838611][T21309] loop1: detected capacity change from 0 to 17 [ 631.850845][T21301] loop5: detected capacity change from 0 to 143360 [ 631.924888][ T26] audit: type=1800 audit(1638782070.679:35): pid=21314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=13897 res=0 errno=0 09:14:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x700000000000000, 0x7fff) [ 632.006681][T21301] zonefs (loop5) ERROR: Not a zoned block device [ 632.179889][T21326] loop3: detected capacity change from 0 to 17 [ 632.389785][T21338] loop4: detected capacity change from 0 to 17 [ 632.408399][ T26] audit: type=1804 audit(1638782071.159:36): pid=21301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir066189357/syzkaller.pRvjQ4/293/file0" dev="sda1" ino=13897 res=1 errno=0 09:14:31 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:31 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x1000000000000, 0x7fff) 09:14:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x800000000000000, 0x7fff) 09:14:31 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xe5010000, 0x7fff) [ 633.191759][T21357] loop1: detected capacity change from 0 to 17 09:14:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x2000000000000, 0x7fff) [ 633.382580][T21364] loop4: detected capacity change from 0 to 17 [ 633.382922][T21363] loop3: detected capacity change from 0 to 17 09:14:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x900000000000000, 0x7fff) [ 633.667005][T21378] loop1: detected capacity change from 0 to 17 [ 633.782045][T21392] loop4: detected capacity change from 0 to 17 [ 634.000921][T21301] loop5: detected capacity change from 0 to 143360 09:14:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) inotify_init() syz_open_dev$sndpcmp(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000a80)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000180)={[{@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './bus'}}]}) 09:14:33 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xed040000, 0x7fff) 09:14:33 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7ffffffffffff, 0x7fff) 09:14:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xc00000000000000, 0x7fff) [ 634.553862][T21412] loop1: detected capacity change from 0 to 17 [ 634.564510][T21413] loop3: detected capacity change from 0 to 17 [ 634.582632][T21415] loop4: detected capacity change from 0 to 17 [ 634.813565][T21412] loop1: detected capacity change from 0 to 17 09:14:36 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xd00000000000000, 0x7fff) 09:14:36 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xf0ffffff0f0000, 0x7fff) 09:14:36 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xf4ffffff, 0x7fff) 09:14:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f00000002c0)=0xfffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00000001c0)={0xa, 0x100000004e22, 0x101, @loopback}, 0x1c) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "2be0382850fe9a8a", "2d1e956f1e389c707be51ac9c7c8fdbfc0a0d12dff7bdfaa354d9be86a7b360b", "c391b0ad", "adac58fe402e03a0"}, 0x38) socket$unix(0x1, 0x5, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x43, 0x20, 0x1f, 0x8, 0x0, 0xa, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xd72f}, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x2000, 0x8, 0x0, 0x4, 0x0, 0x109a}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) fcntl$getflags(r3, 0x401) connect$unix(r3, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10012, r2, 0x3000) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300)="7afcb206c1f35340c29e455768d4063374845ef738a96fa774af47a0a371de196dafcf866b345e5670b6ba97ce06d86566c4fe4bbd05f06edb7e43995fb80211c559713c149dab1114ae50034c2ab349cbfbe0907265861b10de720b43a5e845df34a40cb3ccba61a96686775ac48ae585fff7945e4c9f5c", 0x78, 0xc000, 0x0, 0x0) 09:14:36 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 637.785304][T21457] loop3: detected capacity change from 0 to 17 [ 637.786514][T21458] loop4: detected capacity change from 0 to 17 [ 637.810189][T21460] loop1: detected capacity change from 0 to 17 09:14:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x100000000000000, 0x7fff) 09:14:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xd07000000000000, 0x7fff) 09:14:36 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xf5070000, 0x7fff) [ 638.272751][T21487] loop4: detected capacity change from 0 to 17 [ 638.326890][T21491] loop1: detected capacity change from 0 to 17 09:14:37 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xe00000000000000, 0x7fff) [ 638.471946][T21500] loop3: detected capacity change from 0 to 17 [ 638.827074][T21512] loop4: detected capacity change from 0 to 17 09:14:38 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400}, r0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x200000000000000, 0x7fff) 09:14:38 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x0, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:38 executing program 5: getpid() sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x798, 0x1, 0x9b19, 0x3, 0x8000, 0x7fff, 0x1f}, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(0x0, r0, 0xb, 0xffffffffffffffff, 0x2) close(r1) landlock_restrict_self(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x100, 0x0, 0x0, 0xffffffff}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000000)='*}\xae\xd9\xb1\xf1\x1c#Z\xccCD\xe5\x9d\xf3\xd1m\xcf\xa7\xde\xb9Z\xfe!\xa0\xaer0}, {0xffffffffffffffff}, 0xffff, 0x3}) ptrace(0x8, r1) sched_setscheduler(r0, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x54, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4ca, 0x0, @perf_config_ext={0x1, 0x3}, 0x0, 0x0, 0xfd9, 0x4, 0x7f, 0x100000, 0x81, 0x0, 0x15e3}, r0, 0xffffffffffffffff, r2, 0xb) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) [ 640.376128][T21580] loop1: detected capacity change from 0 to 17 [ 640.435623][T21575] loop4: detected capacity change from 0 to 17 [ 640.503751][T21580] loop1: detected capacity change from 0 to 17 09:14:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1504000000000000, 0x7fff) [ 640.672906][T21602] loop5: detected capacity change from 0 to 264192 [ 640.827038][T21616] loop4: detected capacity change from 0 to 17 [ 640.840420][T21602] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 09:14:40 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:40 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x0, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x400000000000000, 0x7fff) 09:14:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1d01000000000000, 0x7fff) 09:14:40 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfbffffff, 0x7fff) 09:14:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x300000000000000, 0x7fff) [ 641.877006][T21639] loop4: detected capacity change from 0 to 17 [ 641.884873][T21637] loop5: detected capacity change from 0 to 17 [ 641.901713][T21640] loop1: detected capacity change from 0 to 17 [ 641.903502][T21644] loop3: detected capacity change from 0 to 17 09:14:40 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x0, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:40 executing program 5: r0 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x4, 0x9, 0x5, 0x1, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x230, 0x1, @perf_config_ext={0x4, 0x4}, 0x10, 0x80000001, 0xc, 0x3, 0x335, 0x400, 0x8, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0xe, r0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x2, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c000000300027070000000000000000000000480001004400010007000100637400001c00028018000100000000000021a3000000000000050000000000000000040006000c00070000000000000000000c0008000000000000000000"], 0x5c}}, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = clone3(&(0x7f0000000440)={0x200200000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x2e}, &(0x7f0000000340)=""/85, 0x55, &(0x7f00000003c0)=""/107, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x20, 0x0, 0x9, 0xf9, 0x0, 0x1ff, 0x10020, 0xe, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x1000, 0xe53, 0x5, 0x0, 0x0, 0xfffffff8, 0x1000, 0x0, 0x0, 0x0, 0x8}, r3, 0x6, r2, 0x1) 09:14:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x1f00000000000000, 0x7fff) 09:14:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x700000000000000, 0x7fff) 09:14:41 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfffbffff, 0x7fff) [ 642.349757][T21673] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 642.404485][T21677] loop4: detected capacity change from 0 to 17 09:14:41 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x15, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)={0x2}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0), 0x36fab11b7c5ecaca, 0x0) syz_open_dev$audion(&(0x7f0000000100), 0x1ff, 0x4a02) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) getresgid(&(0x7f0000001e80), 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000080), 0x3, 0x2) dup3(r3, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) dup2(r4, r3) [ 642.489975][T21682] loop1: detected capacity change from 0 to 17 [ 642.723629][T21691] loop3: detected capacity change from 0 to 17 [ 643.085454][T21691] loop3: detected capacity change from 0 to 17 [ 643.126698][T21709] syz-executor.5: vmalloc error: size 1433600, page order 0, failed to allocate pages, mode:0xcc2(GFP_KERNEL|__GFP_HIGHMEM), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 643.295908][T21709] CPU: 1 PID: 21709 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 643.304721][T21709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.314793][T21709] Call Trace: [ 643.318076][T21709] [ 643.321015][T21709] dump_stack_lvl+0xcd/0x134 [ 643.325666][T21709] warn_alloc.cold+0x87/0x17a [ 643.330369][T21709] ? zone_watermark_ok_safe+0x290/0x290 [ 643.335940][T21709] ? __vmalloc_node_range+0x574/0xab0 [ 643.341323][T21709] __vmalloc_node_range+0x883/0xab0 [ 643.346534][T21709] ? vfree_atomic+0xe0/0xe0 [ 643.351056][T21709] ? __snd_dma_alloc_pages+0x50/0x90 [ 643.356546][T21709] __vmalloc+0x69/0x80 [ 643.360627][T21709] ? __snd_dma_alloc_pages+0x50/0x90 [ 643.365931][T21709] ? snd_dma_vmalloc_free+0x40/0x40 [ 643.371154][T21709] __snd_dma_alloc_pages+0x50/0x90 [ 643.376280][T21709] snd_dma_alloc_dir_pages+0x14d/0x240 [ 643.381762][T21709] do_alloc_pages+0xc2/0x180 [ 643.386368][T21709] snd_pcm_lib_malloc_pages+0x3e2/0x990 [ 643.392038][T21709] snd_pcm_hw_params+0x1408/0x1990 [ 643.397159][T21709] ? lockdep_hardirqs_on+0x79/0x100 [ 643.402374][T21709] ? snd_pcm_playback_open+0x130/0x130 [ 643.407842][T21709] ? snd_pcm_hw_param_near.constprop.0+0x6ca/0x8f0 [ 643.414357][T21709] ? mark_held_locks+0x9f/0xe0 [ 643.419138][T21709] ? snd_pcm_oss_disconnect_minor+0x370/0x370 [ 643.425227][T21709] snd_pcm_kernel_ioctl+0x164/0x310 [ 643.430439][T21709] snd_pcm_oss_change_params_locked+0x1936/0x3a60 [ 643.436873][T21709] ? snd_pcm_plugin_append+0x190/0x190 [ 643.442349][T21709] ? mutex_lock_io_nested+0x1150/0x1150 [ 643.447913][T21709] ? snd_pcm_kernel_ioctl+0x1cc/0x310 [ 643.453301][T21709] snd_pcm_oss_make_ready+0xe7/0x1b0 [ 643.458665][T21709] snd_pcm_oss_sync+0x1de/0x800 [ 643.463532][T21709] snd_pcm_oss_release+0x276/0x300 [ 643.468655][T21709] __fput+0x286/0x9f0 [ 643.472656][T21709] ? snd_pcm_oss_sync+0x800/0x800 [ 643.477690][T21709] task_work_run+0xdd/0x1a0 [ 643.482261][T21709] exit_to_user_mode_prepare+0x27e/0x290 [ 643.487957][T21709] syscall_exit_to_user_mode+0x19/0x60 [ 643.493439][T21709] do_syscall_64+0x42/0xb0 [ 643.497960][T21709] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 643.503872][T21709] RIP: 0033:0x7f3dd6dc5a04 [ 643.508292][T21709] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 643.527918][T21709] RSP: 002b:00007f3dd5d45cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 643.536380][T21709] RAX: ffffffffffffffea RBX: 6666666666666667 RCX: 00007f3dd6dc5a04 [ 643.545056][T21709] RDX: 0000000000004a02 RSI: 00007f3dd5d45d60 RDI: 00000000ffffff9c [ 643.553040][T21709] RBP: 00007f3dd5d45d60 R08: 0000000000000000 R09: 0000000000000000 [ 643.561029][T21709] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000004a02 [ 643.569016][T21709] R13: 00007fff884357df R14: 00007f3dd5d46300 R15: 0000000000022000 [ 643.577001][T21709] 09:14:42 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x800000000000000, 0x7fff) 09:14:42 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfffdffff, 0x7fff) 09:14:42 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x0, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x3205000000000000, 0x7fff) [ 643.829427][T21727] loop1: detected capacity change from 0 to 17 [ 643.836319][T21728] loop3: detected capacity change from 0 to 17 09:14:42 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x0, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 643.899774][T21725] loop4: detected capacity change from 0 to 17 09:14:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x900000000000000, 0x7fff) 09:14:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x3a02000000000000, 0x7fff) 09:14:43 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xffff7f00, 0x7fff) [ 644.317102][T21756] loop1: detected capacity change from 0 to 17 [ 644.461992][T21761] loop4: detected capacity change from 0 to 17 09:14:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xa08000000000000, 0x7fff) 09:14:43 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x0, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 644.583127][T21709] Mem-Info: [ 644.598672][T21709] active_anon:3475 inactive_anon:162229 isolated_anon:0 [ 644.598672][T21709] active_file:6743 inactive_file:77927 isolated_file:0 [ 644.598672][T21709] unevictable:768 dirty:144 writeback:0 [ 644.598672][T21709] slab_reclaimable:23753 slab_unreclaimable:118794 [ 644.598672][T21709] mapped:32207 shmem:19770 pagetables:1849 bounce:0 [ 644.598672][T21709] kernel_misc_reclaimable:0 [ 644.598672][T21709] free:1209730 free_pcp:10061 free_cma:0 [ 644.660153][T21766] loop3: detected capacity change from 0 to 17 [ 644.684351][T21761] loop4: detected capacity change from 0 to 17 [ 644.882259][T21709] Node 0 active_anon:13892kB inactive_anon:650208kB active_file:26856kB inactive_file:311708kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:128828kB dirty:576kB writeback:0kB shmem:76628kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 301056kB writeback_tmp:0kB kernel_stack:10832kB pagetables:7488kB all_unreclaimable? no [ 644.977322][T21784] loop1: detected capacity change from 0 to 17 [ 645.176301][T21709] Node 1 active_anon:8kB inactive_anon:908kB active_file:116kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2452kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:8kB all_unreclaimable? no [ 645.229280][T21709] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 645.257816][T21709] lowmem_reserve[]: 0 2645 2645 2645 2645 [ 645.264718][T21709] Node 0 DMA32 free:876636kB boost:0kB min:35676kB low:44592kB high:53508kB reserved_highatomic:0KB active_anon:13892kB inactive_anon:645948kB active_file:26856kB inactive_file:311708kB unevictable:1536kB writepending:576kB present:3129332kB managed:2716816kB mlocked:0kB bounce:0kB free_pcp:42488kB local_pcp:21484kB free_cma:0kB [ 645.303793][T21709] lowmem_reserve[]: 0 0 0 0 0 [ 645.309894][T21709] Node 0 Normal free:0kB boost:0kB min:4kB low:4kB high:4kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:400kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 645.349010][T21709] lowmem_reserve[]: 0 0 0 0 0 [ 645.353925][T21709] Node 1 Normal free:3948780kB boost:0kB min:54224kB low:67780kB high:81336kB reserved_highatomic:0KB active_anon:8kB inactive_anon:908kB active_file:116kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:216kB local_pcp:216kB free_cma:0kB [ 645.398175][T21709] lowmem_reserve[]: 0 0 0 0 0 [ 645.403321][T21709] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 645.450681][T21709] Node 0 DMA32: 361*4kB (UME) 655*8kB (UME) 584*16kB (UME) 106*32kB (UME) 32*64kB (UME) 11*128kB (UME) 3*256kB (ME) 6*512kB (UME) 2*1024kB (UM) 4*2048kB (UM) 205*4096kB (UM) = 876636kB [ 645.488363][T21709] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 645.517434][T21709] Node 1 Normal: 51*4kB (UME) 194*8kB (UME) 117*16kB (UM) 86*32kB (UM) 58*64kB (UE) 35*128kB (UME) 8*256kB (U) 8*512kB (U) 2*1024kB (UE) 3*2048kB (UM) 957*4096kB (M) = 3948780kB [ 645.550593][T21709] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 645.572841][T21709] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 645.590836][T21709] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 645.608623][T21709] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 645.629789][T21709] 36527 total pagecache pages [ 645.636893][T21709] 0 pages in swap cache [ 645.651374][T21709] Swap cache stats: add 0, delete 0, find 0/0 [ 645.725351][T21709] Free swap = 0kB [ 645.742899][T21709] Total swap = 0kB [ 645.774864][T21709] 2097051 pages RAM [ 645.797095][T21709] 0 pages HighMem/MovableOnly [ 645.829190][T21709] 384502 pages reserved [ 645.848826][T21709] 0 pages cma reserved 09:14:44 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:45 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:45 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfffffbff, 0x7fff) 09:14:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x3f00000000000000, 0x7fff) 09:14:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xd00000000000000, 0x7fff) 09:14:45 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x0, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 646.647808][T21806] loop3: detected capacity change from 0 to 17 [ 646.672465][T21809] loop1: detected capacity change from 0 to 17 [ 646.683396][T21810] loop4: detected capacity change from 0 to 17 09:14:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0xe00000000000000, 0x7fff) 09:14:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x4000000000000000, 0x7fff) 09:14:45 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfffffdff, 0x7fff) 09:14:45 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x0, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 647.215235][T21831] loop4: detected capacity change from 0 to 17 [ 647.230147][T21832] loop1: detected capacity change from 0 to 17 09:14:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x46300c0000000000, 0x7fff) 09:14:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x1000000000000000, 0x7fff) [ 647.443898][T21847] loop3: detected capacity change from 0 to 17 [ 647.770201][T21857] loop4: detected capacity change from 0 to 17 [ 647.817797][T21864] loop1: detected capacity change from 0 to 17 09:14:47 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:47 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xffffff0f, 0x7fff) 09:14:47 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x0, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x4f06000000000000, 0x7fff) 09:14:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x1003000000000000, 0x7fff) 09:14:47 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 649.231181][T21885] loop4: detected capacity change from 0 to 17 [ 649.262014][T21887] loop1: detected capacity change from 0 to 17 [ 649.267179][T21889] loop3: detected capacity change from 0 to 17 09:14:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x5703000000000000, 0x7fff) 09:14:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x1f00000000000000, 0x7fff) 09:14:48 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x0, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:48 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfffffff4, 0x7fff) [ 649.639708][T21913] loop4: detected capacity change from 0 to 17 09:14:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x5f00000000000000, 0x7fff) [ 649.883168][T21923] loop1: detected capacity change from 0 to 17 [ 649.944094][T21926] loop3: detected capacity change from 0 to 17 09:14:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x2006000000000000, 0x7fff) [ 650.167790][T21939] loop4: detected capacity change from 0 to 17 [ 650.425562][T21952] loop1: detected capacity change from 0 to 17 09:14:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x7404000000000000, 0x7fff) 09:14:51 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x0, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:51 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfffffff5, 0x7fff) 09:14:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x2601000000000000, 0x7fff) 09:14:51 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:51 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 653.312723][T21967] loop3: detected capacity change from 0 to 17 [ 653.320125][T21968] loop1: detected capacity change from 0 to 17 [ 653.366715][T21971] loop4: detected capacity change from 0 to 17 09:14:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3009000000000000, 0x7fff) 09:14:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x7c01000000000000, 0x7fff) 09:14:52 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xfffffffb, 0x7fff) [ 653.771475][T21996] loop1: detected capacity change from 0 to 17 09:14:52 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x0, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 653.879126][T22001] loop4: detected capacity change from 0 to 17 09:14:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3604000000000000, 0x7fff) [ 654.056581][T22009] loop3: detected capacity change from 0 to 17 09:14:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x7fffffffffffffff, 0x7fff) 09:14:53 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1000000000000, 0x7fff) [ 654.485997][T22028] loop4: detected capacity change from 0 to 17 09:14:53 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x0, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x8100000000000000, 0x7fff) [ 654.572008][T22034] loop1: detected capacity change from 0 to 17 [ 654.591240][T22037] loop3: detected capacity change from 0 to 17 09:14:53 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x7ffffffffffff, 0x7fff) [ 654.857911][T22059] loop4: detected capacity change from 0 to 17 [ 654.967818][T22064] loop3: detected capacity change from 0 to 17 09:14:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3009000000000000, 0x7fff) 09:14:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x3f00000000000000, 0x7fff) 09:14:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x8400000000000000, 0x7fff) 09:14:54 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x0, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:54 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xa000000000000, 0x7fff) 09:14:54 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 656.279308][T22086] loop3: detected capacity change from 0 to 17 [ 656.283832][T22087] loop1: detected capacity change from 0 to 17 [ 656.292177][T22088] loop4: detected capacity change from 0 to 17 09:14:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4000000000000000, 0x7fff) 09:14:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9105000000000000, 0x7fff) [ 656.485382][T22097] loop5: detected capacity change from 0 to 17 09:14:55 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x10000000000000, 0x7fff) 09:14:55 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:55 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="73686f00000000735f66696c65a73ca32d6aa856a4bb"]) [ 656.768924][T22118] loop1: detected capacity change from 0 to 17 [ 656.839051][T22120] loop4: detected capacity change from 0 to 17 09:14:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4100000000000000, 0x7fff) [ 656.964233][T22132] loop3: detected capacity change from 0 to 17 09:14:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9500000000000000, 0x7fff) [ 657.135242][T22143] ntfs: (device loop5): parse_options(): Unrecognized mount option sho. [ 657.184111][T22151] loop1: detected capacity change from 0 to 17 [ 657.255074][T22143] ntfs: (device loop5): parse_options(): Unrecognized mount option sho. [ 657.283289][T22132] loop3: detected capacity change from 0 to 17 [ 657.286886][T22164] loop4: detected capacity change from 0 to 17 09:14:56 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x100000000000000, 0x7fff) 09:14:56 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, &(0x7f00000000c0), 0x20d014, &(0x7f0000000500)=ANY=[]) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000040)={0x2, 0x0, 0x0, {0x0, 0xe7ffffff}}) ftruncate(r1, 0x5) syz_mount_image$sysv(&(0x7f00000002c0), &(0x7f0000000340)='./bus\x00', 0x400003f, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000380)="42ca3ae73177f3da8803b43c542d66544ad580315edad94446f5c31d089e1bbdf98c04f014175483a8f39e88d6321f5f911877afe60cef", 0x37, 0x95eb}, {&(0x7f00000003c0)="9248416ceb60b05e4e", 0x9}, {&(0x7f0000000400)='^', 0x1, 0x7fffffff}], 0x200808, &(0x7f0000000140)={[{']@$'}, {'ext2\x00'}, {'\\,/{'}, {'\x00'}, {}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) write$P9_RREADLINK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e007477042ee0869d3f8e6275c6"], 0xe) mkdirat(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x7, 0x8, 0xff, 0xc41, 0xffffffffffffffff, 0x2}, 0x40) r2 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12001, 0x0) inotify_add_watch(r4, &(0x7f00000001c0)='./bus\x00', 0x91000000) sendfile(r2, r3, 0x0, 0x401ffb400) 09:14:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9800000000000000, 0x7fff) [ 657.437814][T22151] loop1: detected capacity change from 0 to 17 [ 657.524600][T22186] loop3: detected capacity change from 0 to 17 09:14:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4400000000000000, 0x7fff) [ 657.575414][T22193] loop4: detected capacity change from 0 to 17 [ 657.757682][T22209] loop1: detected capacity change from 0 to 17 09:14:57 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:14:57 executing program 5: fcntl$notify(0xffffffffffffffff, 0x402, 0x24) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000240)=""/225, 0xe1}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/20, 0x14}, {&(0x7f0000000440)=""/95, 0xa9}, {&(0x7f00000004c0)=""/14, 0xe}, {&(0x7f0000000500)=""/60, 0x3c}, {&(0x7f0000000540)=""/211, 0xd3}, {&(0x7f0000000640)=""/35, 0x23}, {&(0x7f0000000680)=""/33, 0x21}], 0x9, 0x0, 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x2000004e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffe, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5, 0x800, 0x0, 0x0, 0x0, 0xcc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000200)=0x1, 0x4) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x3, 0x0, 0x7f, 0x2a, 0x0, 0x20, 0x2010, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd87, 0x4, @perf_bp={&(0x7f0000000040), 0xd}, 0x50c80, 0x200000000, 0x5307eb63, 0xe3cc55dd1d871bc4, 0x7, 0x4, 0x7fe, 0x0, 0x6, 0x0, 0x31c9}, r1, 0x1003, 0xffffffffffffffff, 0xa) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000340)='hybla\x00', 0x6) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x2010, r2, 0xacbb7000) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) sendto$inet(r0, 0x0, 0x0, 0x1000000024004044, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0xfffffd46, 0x81f4, 0x0, 0x1f4) 09:14:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9902000000000000, 0x7fff) 09:14:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4607000000000000, 0x7fff) 09:14:57 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x100080000000000, 0x7fff) 09:14:57 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 658.601006][T22232] loop3: detected capacity change from 0 to 17 [ 658.608800][T22231] loop1: detected capacity change from 0 to 17 [ 658.706152][T22240] loop4: detected capacity change from 0 to 17 09:14:57 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:14:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4700000000000000, 0x7fff) 09:14:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9b00000000000000, 0x7fff) 09:14:57 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x200000000000000, 0x7fff) [ 659.303363][T22268] loop1: detected capacity change from 0 to 17 [ 659.380021][T22270] loop3: detected capacity change from 0 to 17 [ 659.471073][T22274] loop4: detected capacity change from 0 to 17 09:14:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4a00000000000000, 0x7fff) 09:14:58 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 659.680087][T22286] loop1: detected capacity change from 0 to 17 09:15:00 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:15:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0x9e00000000000000, 0x7fff) 09:15:00 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x300000000000000, 0x7fff) 09:15:00 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:15:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4c02000000000000, 0x7fff) 09:15:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfd, 0x4) r1 = socket(0x10, 0x3, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x6, 0x0, 0x9, 0x0, 0x9, 0x4, 0x1, 0x2, 0xf2fd}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)="1ea8b99a187380fba25aca8fbc02f48d98e107cd6cf24ff91b22a597c9d731eea506baf104d2d580f94b89271686cf13ca0cd0e6afc31f54de3a7d1bc2f4f702acd8ee280efb2cf591790869bab9c19f224a9a0776b3c19720bfede110d5dfe3a3dacbe667c0c30a3a20", 0x6a}, {&(0x7f0000000380)="1dd24df15b87be5d7b377f5a94f24d0c2911988023", 0x15}, {0x0}, {&(0x7f0000000540)="5859a20f6eaac9cf4bde9ff71ac46b3e18361adb25b363e8fe685ee46ed0c94181af67dce45c928c702439e18aad0c203186", 0x32}, {&(0x7f00000003c0)="5b4c8a86", 0x4}], 0x5, &(0x7f0000000680)=ANY=[], 0x20}, 0x11) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4008800}, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000500)={r2}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3400000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000040002002eb12374f7f599bff260d7a3d3bf22aae1c0c821c349dd93368352fd96de7af9d7dd8cc41cfb12bc382df8c85f4cc23a5af1bdacb1683679fcdfc345ab3e76f99fefe3c4648cc2908d10043d56833f6761d1f370ee07a5e7f985da758cadafd4e1d85b25c31c42e1b69c4c31991ad4f6"], 0x34}}, 0x40000) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="0304ff1f5c0060004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) [ 662.165394][T22312] loop4: detected capacity change from 0 to 17 [ 662.209621][T22314] loop3: detected capacity change from 0 to 17 [ 662.228768][T22317] loop1: detected capacity change from 0 to 17 [ 662.268997][T22318] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 662.306653][T22318] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 09:15:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xa100000000000000, 0x7fff) 09:15:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x4d00000000000000, 0x7fff) 09:15:01 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x3ddfc3600000000, 0x7fff) [ 662.595332][T22344] loop4: detected capacity change from 0 to 17 09:15:01 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r0 = syz_io_uring_setup(0x186, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}, &(0x7f0000147000/0x2000)=nil, &(0x7f0000149000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x6, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) io_uring_enter(r0, 0x45f5, 0x60, 0x0, 0x0, 0x1800) syz_io_uring_setup(0x2dd9, &(0x7f0000000280)={0x0, 0x118, 0x4, 0x2, 0x166, 0x0, r0}, &(0x7f0000149000/0x2000)=nil, &(0x7f000014a000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000380)) r5 = mmap$IORING_OFF_SQES(&(0x7f000014a000/0x2000)=nil, 0x2000, 0x2000008, 0x1010, r0, 0x10000000) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f000000a940)) r6 = syz_io_uring_setup(0x356f, &(0x7f0000000240)={0x0, 0x0, 0x2, 0x3}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000140), &(0x7f00000001c0)) io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0x13, 0x20000000, r7) syz_io_uring_submit(r4, r5, &(0x7f0000001580)=@IORING_OP_SENDMSG={0x9, 0xb182fb7da641af67, 0x0, r3, 0x0, &(0x7f0000001540)={&(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x4, @empty, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000001500)}, 0x0, 0x40000, 0x1, {0x0, r7}}, 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) sendmmsg(r8, &(0x7f000000a5c0)=[{{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000002700)="51569dc68fc5801788d7b459cb21bf1ee84a6376fbcd6b4e8bdf5ee274fdbc67010a5c13749161c0b482ed3792f2e7e2c23d32585cedc369f3b836df8ba61f53934f688a5ca4e1a7d6a5d46476d21cd1e7b2ca8b47bf0bacc293145f8e1d527a412cc4c0c8abb26a6a6902d6da9920dbed42eb3970b8bbc5425894286d369a371a2d05e92c723413b0a8b5d9aee41b6f85f03be918d446cd3689d8ad974265d42139aef495069e75cd8fad55f4b10539353176fbc070b4f69ae45a6011478e9cb6799b8e9de89be36fd5f5023aa1ae", 0xcf}, {&(0x7f0000002800)="fdf99e75c768fa7d7496b2db7218cc45cf9a141c2aafdb6e0fa485c0a33077cd2cc9792dadf99a593c69a71b82d78a7213b714e5446899797f9b6047750287b7b9d33848c9b57ed09c5dcb10d98e6760ddc6a40be363106bb0fae8f3eb0516a7bc8c64a103b4c2e7fc003ffc56f6bd419d28", 0x72}], 0x2}}, {{0x0, 0x0, &(0x7f0000003900)=[{&(0x7f00000028c0)="f1f5b5788d6ba1181f77b98fc8a5abb5cf842f43123205c1c2840f97f07eb43d498f8828a1797708bfe6549cda7258dba49772ccf9bbd27a818f", 0x3a}, {&(0x7f0000002900)="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", 0x1000}], 0x2, &(0x7f0000003940)=[{0x28, 0x0, 0xd3f, "97ea5ef6bbb6b977cd849c59736fc5fa4c5194abc2f437"}, {0x98, 0x11, 0x5, "b513863f90d9b42bc3f44e8f605f8ce2594ebb00bb116f2fedb6b89eec7d79c2fb1e7ca46e9fb86c83e4d792fed73e515fd89732094bd428aa07e3b184d10e46e04a442b7a34a6d32a6fac63049ee24445dea511b0f2ea8091548dbd96319d1e94185336e751d10fe3d9fa3bb3ec8a04b34420472d0b9be625c4e2bc0e1d1b3fc6c027455cdbd3af"}, {0x1010, 0x111, 0x1, "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"}, {0x1010, 0x108, 0x262c, "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"}, {0xd0, 0x107, 0x10001, "6b284200aeca79f3696128d1bb597f4cde124b9167fa001228cab66c1f44f904b280785e859f02cd811f687de4b7548ffe01ff983d93902ebddfadc46e79be10fc2c74c6faf0b6753cf71105ab3df46bcb9187747bf8fc99b6721b97dde4a3bd25c8d0b4ea403143df389c783b9a7fd069c30298ce6413e65c353f05a15689a59dacd43f93911ce78a50c960350d3effca9b46dfee6ffe1035daf1e16ac98e838e8c4a89c5b85c3823265111d4b0b087c2ec3b5a64e7f464817a7e3a4594ca6b"}, {0x50, 0x2f, 0xfffffffb, "c62f36fecd2f390621dcb0cb79666c5d42cd70db94be1e703f5173cc1c0868e2704b31dd6ee5429af42492f852dd3fff8fc22ca6a6561e077e650787703c5cab"}], 0x2200}}, {{&(0x7f0000005b40)=@xdp={0x2c, 0x1, 0x0, 0x40}, 0x80, &(0x7f0000005f40)=[{&(0x7f0000005bc0)="9df665d5961c37e8b874044601a7ca1edea178ef9617d3d68f0bc1ad2d201e8b1d909664df8254ec2cd9a001ef12f0d20d6923ab2c9e073e17ac5b85e5a37cada1500397a1ba61f721cfea40cd21b522448d5f0ea44d557168776649a72ffa3389e348ab4b85eb2b", 0x68}, {&(0x7f0000005c40)="7f586e34e76606768c156769272839e7aae27cee91486b0bc8332c01fe2fc9b19e7837f7813be57e4c2463b5ce347e5a5f885e4c022acfe035a27ae5401a6f6c738657f69460a883686cfab5946dd5714df22af41b067821c74612ff3628ee9bae1e934e6fc072eadf1c8598b1ef628614b89ea1c9dbc279a559a62d9c325a677b8296d1f032a6abf8e9730a528793", 0x8f}, {&(0x7f0000005d00)="97658aa4d0131ba949a8f7745850b18092da9957971c7e982ce7eaa9239c4647b07244124803a0c0527152236d1e0c3f951a1e9e455b4dd0fec74ef1de59185f74b1f2a08f898c2910555bce15ad5b1d23370cdc5e30b05b103320071dfc5e07c8126b9780857014508a4add3409edbe2228f6cd40566343286a8fe881b2603343ae662a453e12055102e9f891fce943b0e101", 0x93}, {&(0x7f0000005dc0)="4acdd5828aa4cc7685de0cc81368c53547ac5a71f4cdfe19a13f77ce4a125fa9d1160c4374c4a8fbb6fc4b0f53cd83ced47a41ab651c2fc1ada85711e88088f39f028ba7c9a13d005fed3e30e054aa6c5c5ae92d6c8aed21df5c2f192ab132b6db405a68c6ddf88a9e7a4fc50bf753835bc362d976afc9605d31275684fbe42187e8c65210dae4a4818fef771d334cbbae77ea0926ea39e6c9ecee06914b90ad", 0xa0}, {&(0x7f0000005e80)="8fcdfe5fdd0d1181c2eef8ad29a096630cd67df6a935902c7c57e75a07e4501c4aabddae455c64138bd4034134c7cd93f9", 0x31}, {&(0x7f0000005ec0)="64fe05d1e7f00d0f6f1b88", 0xb}, {&(0x7f0000005f00)="569ee2370edcae458764a435e5971496688982a1722316bbcf", 0x19}], 0x7, &(0x7f0000005fc0)=[{0x68, 0x1, 0x1, "7b3d42042ecca45a8e0d44a7932e0ca0c7d4da9502cbda6c3448c1d039ab582e5a0bf4570238a05e542754253032755a430fe43ce368d39f04d9a42a96e95a548b5026cc038ad69353db7997e4bf6bc5d2f6"}], 0x68}}, {{&(0x7f0000006040)=@caif=@dbg={0x25, 0x0, 0x4}, 0x80, &(0x7f0000006480)=[{&(0x7f00000060c0)="25b47bbbef5578f7464c2117538826435cfc1cac6799e7fc7aff7592c215dd5e388f1d2cd834109bf889704d9e688eb7e153c53507b254cec12866db5fa3e372f595a4a51213a1b5936a6a4c3dccf5b72027fb75b12df814be042e5fc5ee3fade36c1fc0ccf3b47ea20f3152abae7815f93911b0306df93a4a8775ab21cc29fa4d8be2b27434ace50575c2a2e2162416b64b58da197b07685e2f44af3505c4cb3ae1822c9853384ed3c157ec140cb9ffc68d2638e92a1f4da80e762106e3f92f789885be4e1dc191212210b45b98d3965dbb995614353ecd60659bed1c550b986100f5", 0xe3}, {&(0x7f00000061c0)="4e8e2fa20ad8b98560f82831fb1aa3eb3105856005878c210cf444a3a3627f659a9a5f2b3100685c06c5b0a8824f353100de13760dcec0aa990fc3e5efbcaef340b19db7ffd5800145bdb2e2fc7986c1617c26e6aa50aace81b968140aa176611a1babb9b30456ae68ee6a4818ff6975ed17655dcac77e652279b20449825e778008eea3a8b0efb5665ce13028ce38b7fddb68dbf6fa3f99b509618ae61dd761fcc638aa6482bca38f17f3fab48349d8408362fc1ff7320f927bfe11533d2b36c6b3450c74a014489099cf7b164af92c4c24e3df2555f2e5f4aa0cd5fd41c0d05239a346f0ad2fe2913eb7dd3cbba4e53258faaaa4b2267fae8f66ac", 0xfc}, {&(0x7f00000062c0)="21c55863b47c7d", 0x7}, {&(0x7f0000006300)="8eeadd3d38da4cc8f3e9bdaf4e804cb36d98f006d5afa6b70b71b9a8c658c5cc64229fae98b9829e3af8b3528625998f7b1ff4b8678c1999d47d174fb2f85694f4644e361688b27d1645f093796c65c1b18385d98d399779c2680c33558e53ffc5b2f97d63f79cfd9d51f425c3fac8928da2e5040855e26c346386741e4fa5a87f75cfb1b11c4573fa0763356bc6cc139eecfe5c00024852f664d8299562ce50975d26bfeecf2c30beef9e86c4269f1584ad97", 0xb3}, {&(0x7f00000063c0)="ea8ed4edcd495cc328c6b3a3fa87046a234a84b7746c3a8f54f57406ef3ce33dadaaee341432d1036bfbede31e862eafb90b9cc019f1127a59dddfc99a8fb1ef51cb38cdbc4d87c84b9664dabf87c6800f892487a764b1823fa7ed706d09d68b139b9cb440aac35b3a4b79fbbe28f000cef35f1ae7daafaa51f444fca85dfcb57b14bf5c0967ae1ef930ed37b84acd9dcae7fa391905", 0x96}], 0x5, &(0x7f0000006500)=[{0xc0, 0x105, 0x7, "b950c94cfecc5de9e37e9f7c796b9cfe236e93bf769a474468555cfdc991365cc883f58e20008d433625353a3956c07faa715435c9e9b56b64658b5fa45cf711b20738b56d0b8ac681e878e3c263c579dd0f29d363e387b9ac68c73550ea47db77a2a3dc738e8e7fcdc597093c8302f331b894c8c2e6a179b8ec7ce57ceb2c382760245beff6b1d6a42ebd749a3b8912ca2a0e726bb9745c77ca3b5d90ac804347259caeb50971d1d97e1dd8"}, {0x70, 0x1, 0x7, "c694752dfcb2fc46c2cf30fc4878fa13d9776986b70302d7377f7cda959da94fe4584ff800e8c0520797a50a950a923c8fac22396301e2e7d30e6a01bb8e2dcc88b7199fc052ee63234baeb6968048ba92d9d33192ffa1dbca2a6a"}, {0x1010, 0x117, 0x15, "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"}, {0x100, 0x3a, 0x80000000, "152f6bb51fde3ef6a2db31d909ef44ee0c83617364aebf7bd022cec7ca6f63a130ad212ee9799b2196da8198dcff8cb088bc0d0f7e81247acac0d5a45137910f753669655f09d0312384fd422192553f7ff463e86fec7220bb86c2415b69f73b665628be300c94cf9f91aff6f5ffee1d4e258cb573c4aef60fd432aebce2b435dba664e299ab0fa6b72735cb2f257442f04ab43f5e44462965168c5d44c5f619fb36d6d11e9acf8f37be6993111162fb4b223e94a51dcad61487653299ce61054befe79ab1f01bd23612ec610acd778cfab53dc26b792089d23b3e9300bf2ed433c6da00dbc35f82ea16"}, {0x50, 0x29, 0xfffffffb, "7ed0976e8447e684ade610d9bf6a7db62f0e3ec2450fee4e58adde982713c7b6c87f09fcd3c8a2b1fe089718778cd931beb69bdf6dd58eb8cb40be914e4e"}, {0xc0, 0x115, 0x18, "2c7189fecfcbef1bb5cf9a44d6230eecdcfd2ec21d42ffbaefb05819cfb9984adba80299eceef11222f2e9fd55deb9e4b8324097f9854f9527d5e8bc5404ed939fd05ad1f91331c4948304373461385320fd43c3a9be2e8c41c4f065395bfcc42b5547d4d338a76381cbeb3684e797157ebd5a0d8533f839e50660328681e9cfa61880f45fb91482febf4b3e0fbc4a7ca22a1113285d01a0b4b7ebf8e6399dac10110606dfedd475799f"}, {0xd8, 0x10d, 0x3, "863c2e1f5a1931c270961862ac0956de9ab2fae225593b547901d67f19209b35715f76ac116fc25411129a76924738c579fd2eac1eb4c15ee71e0e50aad7e4645bf0c32f4edb14fdcf275f21847427a8219eca044261c1d7902c008158a40a780a380169c9316fbf0badf0f8020b68e3e2fb81f55ccae23223befd86565f0975fe9aae6ce345c0b0c7c4425a1565536e817221702b0156809853919e1c5cde6a507a38ab8f5459a8896cf248c85667a922b38e60afc5c23287ccb03c4320b92f44bfaac81e078e2d"}, {0xa8, 0x109, 0x5, "c7c7d977b65728866f071dcca4366724680b92d3f2f9fbf1717f57488ef4acd46da757dcecb7270caee09c5bc546652333feda902bb7da563fafed170fdbe6210bbe571982c5d481f813aece48eb84b77cd1f6acbf6eed4863dccb090736e7617b48e3235b245fde8926704884fb30f31eb77f5af2555fa64de28471b2e43f1f504619654d86cea074a077e42867e7a06f62"}, {0x50, 0x104, 0x8feb, "473f2c0e405e0d635bce902a1f309aab7b8af22f9385e421c7949fcdebe2a7bc51494b511a4f69930501eb63b45c76d8e7f0502ad611e3d0febe"}, {0x40, 0x111, 0x80000000, "cc9758cf45f61985eb216d7d1108df92eb1f168ce545b9a51e35d2ccba0805e40c4bd29706bc6cdf9e8e28ee9dc2340a"}], 0x1560}}, {{&(0x7f0000007a80)=@ieee802154={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x80, &(0x7f0000008d40)=[{&(0x7f000000a740)="d19a8422a43ffbba4f20b401974487", 0xf}, {&(0x7f0000007b40)="4741261224d0d936e330997e0c87b5c9c6c7b09e726cbe6d4725950edf5bf1c4b74b0946be519f2b2ec3a8a4993a7b9041ebcf2b38c40506dd1d3094e9012f00cf1c425efc8a9938764f63e805689856d8f1849ef5982e1b8d3a38216e3faa604b27bd1ce60320a9cec3c219", 0x6c}, {&(0x7f0000007bc0)="bcaf1b22a932bd2d32f64e80e7a5e658aeef635270a8daed15c9f0982dc9589a3eb38e7aa4f372726c833247d36aeb9f24604fe976c8b48975120bd5fb40dd2a511102663de35256631a1d65e637a95e1feae9a4ddbc8f5bdbaddafc806d17c948f33b0251e9a66debeebbb840cca1b6127bb9cda94fa5e7fd5a2aed51c0ff53f0f343cd5deeb4366bb5e2ee1881457851e83e94", 0x94}, {&(0x7f0000007c80)="0de7e4442eeb403b0f742f7ac9f2c36113faef13745928d5a5bd58f3599e7d46e89353606327d6a634687a0e7490b6c56f6bd0642bcc0ca4cc4e833be7c09cb71c4e95d1ca040191590bec86444e0cdc27f5febdb4871c034329828fcbdadea486462b69205a2c2c96c3e310fc3f15f9b1eef2b9477a96b379417b1e", 0x7c}, {&(0x7f0000007b00)="0e883739ac578581651df32d36e162eeca7c09", 0x13}, {&(0x7f0000007d40)="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", 0x1000}], 0x6, &(0x7f0000008dc0)=[{0x30, 0x3a, 0x9, "21193f9ba5c427f80076777fd70e3126fa2dd6f77b680940b2a2dc6bfa94"}, {0x68, 0x103, 0x4, "e7c38c51196e242cbad0710c14d269df20490194d4047c06bc0112b662f57c3f738bb82e3bcdaf4da55fe4cbf218b2185eb1b84c08ed7f76813360962493a121bbe6867f807daad515b3a00f477700ce9b8b3d56eb"}, {0x80, 0x0, 0x0, "7a802116c5c081f66611ad77e2a5f1cda8e5bf055f6cf06e0976287120dff82e6f8bb16c27b5ccb1fef784b3d1618938e9dcdd2d4cab5f367e7bf76c28860b0d4e0a2b4c402fe0dcb0d918cbdf7ea7cf50211b60c4c261c8d4660e1ae87de7e0672d2d5bd476c70ef4db25"}, {0x40, 0x10f, 0x4, "72af8426cc83939abb64ed9ec42ff1771f5edd40677d1bca7fe9084bfbab378ce0983cc31bffe928f27cc7f431"}, {0x110, 0x29, 0x4, "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"}, {0x10, 0x0, 0x7000}], 0x278}}, {{0x0, 0x0, &(0x7f000000a3c0)=[{&(0x7f0000009040)="0ba9ec901d900c84cfbb5f8180a5eac2b402f2829942654f9af0f42afc1ea47e144058295c8673bc109aefc5c161d6548ec625410893afea0c02e5acb35de818e078dfbca68e5c15d6edab1c0868d0bb07de0cf3f4307ffd0f43298833a7bb61a39be03334fde9e90e7d14e79527c5b9a93703bcfea69d62fdf1caf95d6718c29780", 0x82}, {&(0x7f0000009100)="d9aae72e6f5f8d3ebea46652ea284deb4aec30814cdb24d83fb2f9921baa166cc202ee9b715bf919dcb977bf2787c0612fd34a4d5386f09a6f15604784836ed986414ca7abf16db339a000c424a44fa564a1eafdb7faf7ef215149995ceabd59a4e829ec62d99f9f4a49272055fdcaf48516890079e0fb304842197491bbf0d3d6745c1a10fe240a834b88a8bb27c1553c4568c5aae9d13104cbb645489dade786e12a7e8c681488d95e0cfc300bd71265d26f674726d05dfe25f15377ef18bdd087e11bdd99e26271c3c2dcddaea205ab6e94aef6549be27da1a1afd4abffe3350ce28481", 0xe5}, {&(0x7f0000009200)="90a2bc1e273440aef0970c58fc3045", 0xf}, {&(0x7f0000009240)="b6e76fd88d2b360fc3dbae1040958e09a9e8e3f16c9714eb0b413109a2313ff51167310bf0edc8102dc5357b06d97ee23b24635a2bc0e246c7d44739d3712c260daf890d7b46657a0cc83dc46e92dbd3358fb2d7bbf806cd2a2cb46c063d04d7ea19ca98ee6c395aaf6f3651d5cac28bae9534ad4244c71e43bf24fabff3055bf9cc3bc45ff55a13", 0x88}, {&(0x7f000000a780)="23e0071a66557d037312c194cdb426d2f686c613c3bcce161139d3a48bfdffa64ad6ad8ba016a63e10639bc4c663e526ebbc3c0bc9200e390fe0cf6bb56ecb33122f3e8b0a0022e200000000000044424884a7d278abb36ab30fb7fd765090c622ada8a748c1f1000088a806f1c63bf15d98e3c1b64a8f05956b38400196af287afafa34c6fb6ab97479ae38e2e660097a", 0x91}, {&(0x7f00000093c0)="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", 0x1000}], 0x6, &(0x7f000000a440)=[{0xb8, 0x101, 0x393, "3416b547aef8b822bee22a43a0f4bf7a35c50fcd27c26dce13c684253517538bdcffa4fbb2db610cabe16065402c3049e9126b993fdf1f95927f64aa17f96d161826ae7ea56aa3c8fbd9faf01c1bde22cd3c4608d088403d916a257f30de7958e4bd520a0bf205e36c27f5ff8b484aba0c17d17b6025289ccfde09789b7a05e6298b7f2e563f7b2ecdf509ea42b61918db89f461455ac7494a4855d26946db7a163045d8"}, {0x98, 0x1a, 0x91e8, "554b4effd54e7991b0ed0dacac847bcbaa65cb83801cf57c4c03021fd6168b71b37ecf76167760814b1c6c32a9e828062cc3cd4a01837e2d91c63157432faca32b14aba6507f6efae66826f7782db3beb06fda59de31a1860f2969e43441a75ac0b813a607b254c24f7c43672ed97916db59100070e58086da28033cfb5e6198e8e46a1949b7a63d"}], 0x150}}], 0x6, 0x4000845) write$binfmt_script(r8, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000148000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x51257000) preadv(r8, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff00f}], 0x5, 0x0, 0x0) 09:15:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xa400000000000000, 0x7fff) [ 662.646243][T22350] loop1: detected capacity change from 0 to 17 [ 662.700957][T22356] loop3: detected capacity change from 0 to 17 09:15:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5000000000000000, 0x7fff) [ 663.079500][T22373] loop4: detected capacity change from 0 to 17 [ 663.170385][T22375] loop1: detected capacity change from 0 to 17 09:15:03 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:15:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xa700000000000000, 0x7fff) 09:15:03 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x400000000000000, 0x7fff) 09:15:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5300000000000000, 0x7fff) 09:15:03 executing program 5: syz_open_dev$swradio(&(0x7f0000000300), 0x0, 0x2) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x8, @private1, 0x1f}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000000c0)=0xfffffffc, 0x4) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={[0x4]}, 0x8) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000180)={'vlan0\x00', &(0x7f0000000200)=@ethtool_rxnfc={0x2e, 0x9, 0x1, {0x4, @usr_ip4_spec={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0xa2d, 0x8, 0x1, 0x8}, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}, 0x0, 0x7, [0x7, 0x7fffffff]}, @ether_spec={@random="a0c92dc6b97a", @random="76a6a0c8ca19", 0x2}, {0x0, @remote, 0x3, 0x1, [0x4, 0x100]}, 0x200, 0x4}, 0x3, [0x7fffffff, 0x1, 0xfffffffb]}}) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 09:15:03 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 664.401491][T22398] loop3: detected capacity change from 0 to 17 [ 664.463232][T22401] loop4: detected capacity change from 0 to 17 [ 664.558764][T22409] loop1: detected capacity change from 0 to 17 09:15:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xaa00000000000000, 0x7fff) 09:15:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5600000000000000, 0x7fff) 09:15:03 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x500000000000000, 0x7fff) 09:15:03 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 664.965278][T22426] loop4: detected capacity change from 0 to 17 09:15:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xad00000000000000, 0x7fff) [ 665.153961][T22439] loop3: detected capacity change from 0 to 17 [ 665.235082][T22445] loop1: detected capacity change from 0 to 17 09:15:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5900000000000000, 0x7fff) [ 665.477284][T22455] loop4: detected capacity change from 0 to 17 [ 665.652212][T22465] loop1: detected capacity change from 0 to 17 09:15:04 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:15:04 executing program 5: syz_open_dev$swradio(&(0x7f0000000300), 0x0, 0x2) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x8, @private1, 0x1f}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000000c0)=0xfffffffc, 0x4) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={[0x4]}, 0x8) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000180)={'vlan0\x00', &(0x7f0000000200)=@ethtool_rxnfc={0x2e, 0x9, 0x1, {0x4, @usr_ip4_spec={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0xa2d, 0x8, 0x1, 0x8}, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}, 0x0, 0x7, [0x7, 0x7fffffff]}, @ether_spec={@random="a0c92dc6b97a", @random="76a6a0c8ca19", 0x2}, {0x0, @remote, 0x3, 0x1, [0x4, 0x100]}, 0x200, 0x4}, 0x3, [0x7fffffff, 0x1, 0xfffffffb]}}) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 09:15:04 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x700000000000000, 0x7fff) 09:15:04 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:15:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xae06000000000000, 0x7fff) 09:15:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5c00000000000000, 0x7fff) [ 665.887258][T22481] loop3: detected capacity change from 0 to 17 [ 665.899743][T22482] loop4: detected capacity change from 0 to 17 09:15:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb000000000000000, 0x7fff) [ 665.977135][T22490] loop1: detected capacity change from 0 to 17 09:15:04 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x800000000000000, 0x7fff) [ 666.176708][T22490] loop1: detected capacity change from 0 to 17 [ 666.250687][T22512] loop4: detected capacity change from 0 to 17 09:15:05 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5c05000000000000, 0x7fff) 09:15:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb300000000000000, 0x7fff) [ 666.367111][T22522] loop3: detected capacity change from 0 to 17 [ 666.392282][T22526] loop1: detected capacity change from 0 to 17 09:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x5f00000000000000, 0x7fff) [ 666.668211][T22536] loop4: detected capacity change from 0 to 17 [ 666.781034][T22549] loop1: detected capacity change from 0 to 17 [ 666.831963][T22536] loop4: detected capacity change from 0 to 17 09:15:05 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x803000000000000, 0x7fff) 09:15:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xaa00000000000000, 0x7fff) 09:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6200000000000000, 0x7fff) 09:15:05 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:15:05 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:15:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb600000000000000, 0x7fff) [ 667.131702][T22565] loop1: detected capacity change from 0 to 17 [ 667.143452][T22571] loop3: detected capacity change from 0 to 17 [ 667.176592][T22572] loop5: detected capacity change from 0 to 17 09:15:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6500000000000000, 0x7fff) 09:15:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xaa00000000000000, 0x7fff) [ 667.286715][T22587] loop4: detected capacity change from 0 to 17 09:15:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb603000000000000, 0x7fff) 09:15:06 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x900000000000000, 0x7fff) 09:15:06 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 667.498920][T22600] loop1: detected capacity change from 0 to 17 [ 667.523566][T22603] loop5: detected capacity change from 0 to 17 09:15:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6800000000000000, 0x7fff) 09:15:06 executing program 5: getpid() r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0xfffffffd) sched_setscheduler(0x0, 0x6, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) timer_create(0x7, &(0x7f0000000140)={0x0, 0x27}, &(0x7f00000001c0)) r3 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b000100626174616476000f0400028008000a00", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000001740)={0x11, 0x3, 0x0, 0x1, 0x9, 0x6, @broadcast}, 0x14) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) socket$inet_dccp(0x2, 0x6, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'hsr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$nl_route_sched(r3, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x180, 0x24, 0x200, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, {0xffff, 0xfff3}, {0x8, 0x2}, {0x7, 0x9}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x1968}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x1, 0x1, 0x3, 0x9, 0x1, 0x9, 0xffffffff, 0x1}}, {0x6, 0x2, [0x9]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x2}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x80800}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xbdf0}, @TCA_STAB={0xe0, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x1, 0x7f, 0x7fff, 0x2, 0x2, 0x4, 0x3, 0x3}}, {0xa, 0x2, [0x0, 0x1, 0x40]}}, {{0x1c, 0x1, {0x2, 0xff, 0x3, 0x40, 0x0, 0x4, 0x80, 0x6}}, {0x10, 0x2, [0x2, 0x2, 0x400, 0x8965, 0x4, 0x4]}}, {{0x1c, 0x1, {0x0, 0x0, 0x5, 0x2, 0x0, 0x1, 0xe93, 0x5}}, {0xe, 0x2, [0xe9ec, 0x3, 0x8, 0x80, 0x1ff]}}, {{0x1c, 0x1, {0x51, 0x8, 0x5, 0x3f, 0x3, 0x7, 0x6, 0x3}}, {0xa, 0x2, [0xe3ff, 0x1, 0x4]}}, {{0x1c, 0x1, {0x2, 0x6, 0x8, 0x6, 0x0, 0x9199, 0xa68c, 0x9}}, {0x16, 0x2, [0x2fcb, 0xa5, 0x1, 0x7f, 0x1, 0x4, 0x0, 0xff, 0x9]}}]}, @qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x4, 0x1e, 0xfffff2ea, 0x90, 0xa, 0x0, 0x81, 0x2a, 0x6be5ea80}}}}]}, 0x180}, 0x1, 0x0, 0x0, 0x1}, 0x40000) [ 667.707888][T22617] loop4: detected capacity change from 0 to 17 [ 667.773265][T22623] loop3: detected capacity change from 0 to 17 09:15:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xb900000000000000, 0x7fff) [ 667.895396][T22633] loop1: detected capacity change from 0 to 17 09:15:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6b00000000000000, 0x7fff) 09:15:07 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 668.211107][T22653] loop4: detected capacity change from 0 to 17 [ 668.407603][T22665] loop1: detected capacity change from 0 to 17 09:15:07 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:15:07 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xd00000000000000, 0x7fff) 09:15:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xbc00000000000000, 0x7fff) 09:15:07 executing program 5: syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) syz_io_uring_submit(r0, r1, &(0x7f0000000080)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x2000}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x2, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x29, 0x829, 0x0, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/98, 0x62}], 0x1, 0x6c00000000000000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="f309fa176d04094853b1c000d58dd3d256", @ANYRES16=0x0, @ANYBLOB="000000000000000000002700000008000300", @ANYRES32=0x0, @ANYBLOB="1b0034004d9095adbf6b7b5cc7a6beb297cf8fb8d8c323a34a55760006003600060000000a00060050505050505000000a00060000b9a70000000000b5002a007e150a0c05fffffffffffffbffffff0300000003000000269502e20255b9b9325aa62e44dcdfb4ef3d976a21b1d5d1dcb63604e11592577f3a3539c4462ae1dc701f45819d185dbdabcde75092d4aaf34f6f57ce8d9e175bcca1ef50eecc4ade83f3d99a9040932aeb9294b3a093f062d08933d02951fa78de56328a717a4ebd2733447fe808bd236fe7956259394123dfe98f16afdd5b7501389a34a16398cc739c9a46a7a34c3b1e29d87cd0fe3e01000000000700340088d4c70006003600c9000000"], 0x120}}, 0x0) socket(0x10, 0x803, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000540)={0x3, 0x7, 0x54a7748d}) socket(0x10, 0x803, 0x0) r4 = socket(0x11, 0x3, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r5, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) bind$inet(r5, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) 09:15:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6c08000000000000, 0x7fff) [ 668.723231][T22682] loop3: detected capacity change from 0 to 17 [ 668.731109][T22684] loop4: detected capacity change from 0 to 17 09:15:07 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 668.862077][T22693] loop1: detected capacity change from 0 to 17 09:15:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xbe00000000000000, 0x7fff) 09:15:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x6e00000000000000, 0x7fff) 09:15:07 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0xf07333500000000, 0x7fff) [ 669.237425][T22713] loop4: detected capacity change from 0 to 17 09:15:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xbf00000000000000, 0x7fff) [ 669.468845][T22725] loop1: detected capacity change from 0 to 17 09:15:08 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 669.630187][T22733] loop3: detected capacity change from 0 to 17 [ 669.692899][T22725] loop1: detected capacity change from 0 to 17 09:15:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7203000000000000, 0x7fff) [ 669.789925][T22746] loop4: detected capacity change from 0 to 17 [ 670.074674][T22763] loop1: detected capacity change from 0 to 17 [ 670.254693][ T9034] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:15:09 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:15:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xd304000000000000, 0x7fff) 09:15:09 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1000000000000000, 0x7fff) [ 670.364917][ T9034] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 53006 - 0 [ 670.421209][T22779] loop3: detected capacity change from 0 to 17 [ 670.431262][T22780] loop4: detected capacity change from 0 to 17 [ 670.568427][ T9034] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 670.631058][ T9034] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 53006 - 0 [ 670.788632][ T9034] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 670.833209][ T9034] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 53006 - 0 [ 671.004545][ T9034] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 671.049791][ T9034] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 53006 - 0 [ 673.319921][ T9034] device hsr_slave_0 left promiscuous mode [ 673.332984][ T9034] device hsr_slave_1 left promiscuous mode [ 673.362328][ T9034] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 673.388391][ T9034] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 673.454201][ T9034] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 673.495289][ T9034] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 673.536520][ T9034] device bridge_slave_1 left promiscuous mode [ 673.544429][ T9034] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.567160][ T9034] device bridge_slave_0 left promiscuous mode [ 673.573395][ T9034] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.677584][ T9034] device veth1_macvtap left promiscuous mode [ 673.684295][ T9034] device veth0_macvtap left promiscuous mode [ 673.726370][ T9034] device veth1_vlan left promiscuous mode [ 673.732500][ T9034] device veth0_vlan left promiscuous mode [ 674.937839][ T9034] team0 (unregistering): Port device team_slave_1 removed [ 675.004776][ T9034] team0 (unregistering): Port device team_slave_0 removed [ 675.066202][ T9034] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 675.096809][ T9034] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 675.397717][ T9034] bond0 (unregistering): Released all slaves [ 676.511574][T22825] chnl_net:caif_netlink_parms(): no params data found [ 676.912172][T22825] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.961112][T22825] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.990756][T22825] device bridge_slave_0 entered promiscuous mode [ 677.027001][T22825] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.064447][T22825] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.082875][T22825] device bridge_slave_1 entered promiscuous mode [ 677.205088][T22825] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 677.258728][T22825] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 677.418219][T22825] team0: Port device team_slave_0 added [ 677.442534][T22825] team0: Port device team_slave_1 added [ 677.618229][T22825] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 677.625193][T22825] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 677.676023][ T7] Bluetooth: hci5: command 0x0409 tx timeout [ 677.745694][T22825] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 677.819404][T22825] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 677.836100][T22825] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 677.962091][T22825] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 678.139219][T22825] device hsr_slave_0 entered promiscuous mode [ 678.166628][T22825] device hsr_slave_1 entered promiscuous mode [ 678.212831][T22825] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 678.255804][T22825] Cannot create hsr debugfs directory [ 678.964688][T22825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 679.025146][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 679.056341][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 679.091682][T22825] 8021q: adding VLAN 0 to HW filter on device team0 [ 679.122616][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 679.141143][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 679.175980][ T1137] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.183065][ T1137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 679.225973][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 679.234090][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 679.278906][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 679.316134][ T1137] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.323237][ T1137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 679.356666][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 679.408319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 679.417585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 679.457382][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 679.488846][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 679.507097][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 679.545559][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 679.616552][ T2954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 679.647840][ T2954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 679.682041][ T2954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 679.724746][ T2954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 679.755671][ T8185] Bluetooth: hci5: command 0x041b tx timeout [ 679.769937][T22825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 679.865859][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 679.873425][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 679.941560][T22825] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 680.293146][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 680.317359][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 680.370606][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 680.397941][ T1137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 680.419297][T22825] device veth0_vlan entered promiscuous mode [ 680.450006][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 680.459028][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 680.486963][T22825] device veth1_vlan entered promiscuous mode [ 680.578845][ T8186] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 680.592669][ T8186] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 680.626078][ T8186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 680.634758][ T8186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 680.678087][T22825] device veth0_macvtap entered promiscuous mode [ 680.717579][T22825] device veth1_macvtap entered promiscuous mode [ 680.783800][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.824726][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.845454][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.865326][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.875155][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.897122][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.955902][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 681.007867][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.061800][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 681.095389][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.147667][T22825] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 681.157883][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 681.181020][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 681.216272][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 681.235881][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 681.258434][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.295488][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.335633][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.355929][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.396966][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.427457][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.465536][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.484943][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.506974][T22825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.535070][T22825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.566867][T22825] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 681.598279][ T8186] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 681.616021][ T8186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 681.816804][ T980] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 681.825010][ T980] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 681.845386][ T8186] Bluetooth: hci5: command 0x040f tx timeout [ 681.928342][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 681.958644][ T980] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 681.985575][ T980] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 682.037412][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:15:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7800000000000000, 0x7fff) 09:15:21 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:15:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xdb01000000000000, 0x7fff) 09:15:21 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1006000000000000, 0x7fff) 09:15:21 executing program 5: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) 09:15:21 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 682.497777][T23200] loop4: detected capacity change from 0 to 17 [ 682.506882][T23203] loop1: detected capacity change from 0 to 17 [ 682.512054][T23201] loop3: detected capacity change from 0 to 17 09:15:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf005000000000000, 0x7fff) 09:15:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7b00000000000000, 0x7fff) [ 682.890895][T23201] loop3: detected capacity change from 0 to 17 [ 682.902433][T23232] loop1: detected capacity change from 0 to 17 09:15:21 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1809000000000000, 0x7fff) 09:15:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7e00000000000000, 0x7fff) 09:15:21 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 683.012532][T23237] loop4: detected capacity change from 0 to 17 09:15:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf4ffffff00000000, 0x7fff) [ 683.145746][T23249] loop3: detected capacity change from 0 to 17 [ 683.162719][T23252] loop1: detected capacity change from 0 to 17 09:15:21 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) 09:15:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x7fffffffffffffff, 0x7fff) [ 683.274073][T23261] loop4: detected capacity change from 0 to 17 09:15:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf5ffffff00000000, 0x7fff) 09:15:22 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r3) ptrace$setopts(0x4206, 0x0, 0x4, 0x46) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000300)={0x1, 0x1, 0x3, 0x0, r3}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(0xffffffffffffffff) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@delnexthop={0x30, 0x69, 0x400, 0x70bd27, 0x25dfdbfc, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x400c000}, 0x1000) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) syz_io_uring_setup(0x2c50, &(0x7f00000001c0)={0x0, 0x0, 0x20, 0x0, 0xfe}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240), &(0x7f00000002c0)) close(r2) 09:15:22 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1b31693300000000, 0x7fff) [ 683.456363][T23276] loop1: detected capacity change from 0 to 17 09:15:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x8100000000000000, 0x7fff) [ 683.568736][T23287] loop4: detected capacity change from 0 to 17 [ 683.624712][T23293] loop3: detected capacity change from 0 to 17 09:15:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x53, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624ac"}}, 0x5f) sendfile(r0, r0, &(0x7f0000000240)=0xf802000000000000, 0x7fff) [ 683.774690][T23305] loop1: detected capacity change from 0 to 17 09:15:22 executing program 3: sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x55, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba"}}, 0x61) socket$inet6(0xa, 0x4, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1f00000000000000, 0x7fff) 09:15:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="043c8f000000732e72617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1100}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, {0x0, 0x0, 0x0, 0x56, "2c96eb91f47df94005eea1e38100f2c8a8ef202e245d69101fe3d83bb9266b12186d1c033c7aeb5be193ca793b15860982e3f5cb71c89bcf5fea37e1d9390151481af193bb0ab1bc7ef77a95fb059a658624acdcba61"}}, 0x62) sendfile(r0, r0, &(0x7f0000000240)=0x8206000000000000, 0x7fff) 09:15:22 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/4106, 0x100a) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x56, 0x1f}, 0x28, 0x3, 0x0, 0x2, 0x8001, 0xb36, 0x400, 0x0, 0x0, 0x0, 0x9}, r0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010100}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x81, 0x3ff}, 0x14) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x17f05, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0x10) [ 683.924876][ T8186] Bluetooth: hci5: command 0x0419 tx timeout 09:15:22 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) close_range(r0, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xa204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x1f4, &(0x7f0000001500)=[{&(0x7f000001dac0)=""/102397, 0x18ff5}], 0x24, 0x0, 0x0, 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000280)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x40, 0x5, 0x1f, 0x1, 0x0, 0x9, 0x254d, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x50, 0x7, 0xfff, 0x4, 0x7f, 0x0, 0xe724, 0x0, 0x1, 0x0, 0x275e}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000840}, 0x8040) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) write$binfmt_elf64(r4, 0x0, 0x588) [ 684.010763][T23324] loop3: detected capacity change from 0 to 17 [ 684.054170][T23323] loop4: detected capacity change from 0 to 17 [ 684.178128][T23342] loop1: detected capacity change from 0 to 17 [ 684.185962][T23288] ================================================================== [ 684.194582][T23288] BUG: KASAN: double-free or invalid-free in security_tun_dev_free_security+0x3e/0x70 [ 684.204148][T23288] [ 684.206480][T23288] CPU: 1 PID: 23288 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 684.215254][T23288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.225320][T23288] Call Trace: [ 684.228606][T23288] [ 684.231550][T23288] dump_stack_lvl+0xcd/0x134 [ 684.236255][T23288] print_address_description.constprop.0.cold+0x8d/0x2ed [ 684.243307][T23288] ? security_tun_dev_free_security+0x3e/0x70 [ 684.249401][T23288] kasan_report_invalid_free+0x51/0x80 [ 684.254991][T23288] ? security_tun_dev_free_security+0x3e/0x70 [ 684.261082][T23288] __kasan_slab_free+0xf6/0x110 [ 684.265959][T23288] ? security_tun_dev_free_security+0x3e/0x70 [ 684.272043][T23288] kfree+0x10d/0x2c0 [ 684.275955][T23288] security_tun_dev_free_security+0x3e/0x70 [ 684.281873][T23288] tun_free_netdev+0xdc/0x140 [ 684.286657][T23288] ? tun_flow_flush+0x270/0x270 [ 684.291541][T23288] netdev_run_todo+0x6b4/0xa80 [ 684.296493][T23288] ? generic_xdp_install+0x4a0/0x4a0 [ 684.301807][T23288] ? mutex_is_locked+0xe/0x40 [ 684.306528][T23288] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 684.312838][T23288] ? free_netdev+0x40d/0x5a0 [ 684.317460][T23288] __tun_chr_ioctl.isra.0+0x9a1/0x4230 [ 684.322954][T23288] ? tun_chr_read_iter+0x220/0x220 [ 684.328085][T23288] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 684.334267][T23288] ? security_file_ioctl+0x5c/0xb0 [ 684.339473][T23288] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 684.345741][T23288] ? __tun_chr_ioctl.isra.0+0x4230/0x4230 [ 684.351481][T23288] __x64_sys_ioctl+0x193/0x200 [ 684.356270][T23288] do_syscall_64+0x35/0xb0 [ 684.360708][T23288] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 684.366649][T23288] RIP: 0033:0x7fd05b448ae9 [ 684.371335][T23288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.390966][T23288] RSP: 002b:00007fd05a3be188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 684.399398][T23288] RAX: ffffffffffffffda RBX: 00007fd05b55bf60 RCX: 00007fd05b448ae9 [ 684.407391][T23288] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000005 [ 684.415414][T23288] RBP: 00007fd05b4a2ff7 R08: 0000000000000000 R09: 0000000000000000 [ 684.423418][T23288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 684.431407][T23288] R13: 00007ffebda7d03f R14: 00007fd05a3be300 R15: 0000000000022000 [ 684.439395][T23288] [ 684.442425][T23288] [ 684.444751][T23288] Allocated by task 23288: [ 684.449169][T23288] kasan_save_stack+0x1e/0x50 [ 684.453873][T23288] __kasan_kmalloc+0xa6/0xd0 [ 684.458479][T23288] kmem_cache_alloc_trace+0x1ea/0x4a0 [ 684.463869][T23288] selinux_tun_dev_alloc_security+0x43/0x180 [ 684.469945][T23288] security_tun_dev_alloc_security+0x40/0x90 [ 684.475946][T23288] __tun_chr_ioctl.isra.0+0x27e6/0x4230 [ 684.481509][T23288] __x64_sys_ioctl+0x193/0x200 [ 684.486317][T23288] do_syscall_64+0x35/0xb0 [ 684.490746][T23288] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 684.496659][T23288] [ 684.498982][T23288] Freed by task 23288: [ 684.503048][T23288] kasan_save_stack+0x1e/0x50 [ 684.507742][T23288] kasan_set_track+0x21/0x30 [ 684.512346][T23288] kasan_set_free_info+0x20/0x30 [ 684.517304][T23288] __kasan_slab_free+0xd1/0x110 [ 684.522173][T23288] kfree+0x10d/0x2c0 [ 684.526079][T23288] security_tun_dev_free_security+0x3e/0x70 [ 684.531988][T23288] __tun_chr_ioctl.isra.0+0x2cbf/0x4230 [ 684.537549][T23288] __x64_sys_ioctl+0x193/0x200 [ 684.542334][T23288] do_syscall_64+0x35/0xb0 [ 684.546766][T23288] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 684.552688][T23288] [ 684.555018][T23288] The buggy address belongs to the object at ffff8880131b8200 [ 684.555018][T23288] which belongs to the cache kmalloc-32 of size 32 [ 684.568911][T23288] The buggy address is located 0 bytes inside of [ 684.568911][T23288] 32-byte region [ffff8880131b8200, ffff8880131b8220) [ 684.581947][T23288] The buggy address belongs to the page: [ 684.587582][T23288] page:ffffea00004c6e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8880131b8fc1 pfn:0x131b8 [ 684.599056][T23288] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 684.606626][T23288] raw: 00fff00000000200 ffffea00007cdbc8 ffffea00004c7708 ffff888010c40100 [ 684.615234][T23288] raw: ffff8880131b8fc1 ffff8880131b8000 000000010000003f 0000000000000000 [ 684.623828][T23288] page dumped because: kasan: bad access detected [ 684.630251][T23288] page_owner tracks the page as allocated [ 684.635974][T23288] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2420c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_COMP|__GFP_THISNODE), pid 1, ts 2362036661, free_ts 2296501946 [ 684.653363][T23288] get_page_from_freelist+0xa72/0x2f50 [ 684.658857][T23288] __alloc_pages+0x1b2/0x500 [ 684.663476][T23288] cache_grow_begin+0x75/0x470 [ 684.668254][T23288] cache_alloc_refill+0x27f/0x380 [ 684.673291][T23288] __kmalloc+0x3b3/0x4d0 [ 684.677547][T23288] acpi_ns_internalize_name+0xf2/0x1a1 [ 684.683091][T23288] acpi_ns_get_node_unlocked+0x1d8/0x278 [ 684.688755][T23288] acpi_ns_get_node+0x4b/0x6a [ 684.693714][T23288] acpi_get_handle+0x129/0x211 [ 684.698495][T23288] acpi_has_method+0x6e/0xb0 [ 684.703211][T23288] acpi_device_setup_files+0x2fe/0x680 [ 684.708690][T23288] __acpi_device_add+0x59d/0xc10 [ 684.713709][T23288] acpi_add_single_object+0x95e/0x1aa0 [ 684.719193][T23288] acpi_bus_check_add+0x1ad/0x5d0 [ 684.724236][T23288] acpi_ns_walk_namespace+0x23d/0x41f [ 684.729806][T23288] acpi_walk_namespace+0xee/0x127 [ 684.735024][T23288] page last free stack trace: [ 684.739698][T23288] free_pcp_prepare+0x374/0x870 [ 684.744569][T23288] free_unref_page+0x19/0x690 [ 684.749267][T23288] slabs_destroy+0x89/0xc0 [ 684.753702][T23288] ___cache_free+0x4cc/0x610 [ 684.758309][T23288] qlist_free_all+0x4e/0x110 [ 684.762923][T23288] kasan_quarantine_remove_cache+0xd2/0xf0 [ 684.768783][T23288] kmem_cache_shrink+0x9/0x20 [ 684.773534][T23288] acpi_os_purge_cache+0x11/0x20 [ 684.778494][T23288] acpi_purge_cached_objects+0x37/0xd0 [ 684.784028][T23288] acpi_initialize_objects+0x2b/0x95 [ 684.789405][T23288] acpi_init+0x1cd/0x971 [ 684.793664][T23288] do_one_initcall+0x103/0x650 [ 684.798470][T23288] kernel_init_freeable+0x6b1/0x73a [ 684.803716][T23288] kernel_init+0x1a/0x1d0 [ 684.808063][T23288] ret_from_fork+0x1f/0x30 [ 684.812517][T23288] [ 684.814844][T23288] Memory state around the buggy address: [ 684.820474][T23288] ffff8880131b8100: 05 fc fc fc fc fc fc fc fa fb fb fb fc fc fc fc [ 684.828588][T23288] ffff8880131b8180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 684.836685][T23288] >ffff8880131b8200: fa fb fb fb fc fc fc fc 05 fc fc fc fc fc fc fc [ 684.844754][T23288] ^ [ 684.848833][T23288] ffff8880131b8280: 00 00 01 fc fc fc fc fc 00 00 01 fc fc fc fc fc [ 684.856916][T23288] ffff8880131b8300: fa fb fb fb fc fc fc fc 00 00 00 00 fc fc fc fc [ 684.865021][T23288] ================================================================== [ 684.873092][T23288] Disabling lock debugging due to kernel taint [ 684.879242][T23288] Kernel panic - not syncing: panic_on_warn set ... [ 684.885827][T23288] CPU: 1 PID: 23288 Comm: syz-executor.5 Tainted: G B 5.16.0-rc3-syzkaller #0 [ 684.895995][T23288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.906061][T23288] Call Trace: [ 684.909346][T23288] [ 684.912275][T23288] dump_stack_lvl+0xcd/0x134 [ 684.916884][T23288] panic+0x2b0/0x6dd [ 684.920900][T23288] ? __warn_printk+0xf3/0xf3 [ 684.925515][T23288] ? security_tun_dev_free_security+0x3e/0x70 [ 684.931596][T23288] end_report.cold+0x63/0x6f [ 684.936230][T23288] kasan_report_invalid_free+0x70/0x80 [ 684.941705][T23288] ? security_tun_dev_free_security+0x3e/0x70 [ 684.947783][T23288] __kasan_slab_free+0xf6/0x110 [ 684.952649][T23288] ? security_tun_dev_free_security+0x3e/0x70 [ 684.958734][T23288] kfree+0x10d/0x2c0 [ 684.962644][T23288] security_tun_dev_free_security+0x3e/0x70 [ 684.968551][T23288] tun_free_netdev+0xdc/0x140 [ 684.973336][T23288] ? tun_flow_flush+0x270/0x270 [ 684.978205][T23288] netdev_run_todo+0x6b4/0xa80 [ 684.982990][T23288] ? generic_xdp_install+0x4a0/0x4a0 [ 684.988315][T23288] ? mutex_is_locked+0xe/0x40 [ 684.993005][T23288] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 684.999292][T23288] ? free_netdev+0x40d/0x5a0 [ 685.003895][T23288] __tun_chr_ioctl.isra.0+0x9a1/0x4230 [ 685.009363][T23288] ? tun_chr_read_iter+0x220/0x220 [ 685.014484][T23288] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 685.020654][T23288] ? security_file_ioctl+0x5c/0xb0 [ 685.025821][T23288] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 685.032177][T23288] ? __tun_chr_ioctl.isra.0+0x4230/0x4230 [ 685.037913][T23288] __x64_sys_ioctl+0x193/0x200 [ 685.042716][T23288] do_syscall_64+0x35/0xb0 [ 685.048975][T23288] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 685.054890][T23288] RIP: 0033:0x7fd05b448ae9 [ 685.059317][T23288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.078953][T23288] RSP: 002b:00007fd05a3be188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 685.087384][T23288] RAX: ffffffffffffffda RBX: 00007fd05b55bf60 RCX: 00007fd05b448ae9 [ 685.095366][T23288] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000005 [ 685.103348][T23288] RBP: 00007fd05b4a2ff7 R08: 0000000000000000 R09: 0000000000000000 [ 685.111335][T23288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 685.119317][T23288] R13: 00007ffebda7d03f R14: 00007fd05a3be300 R15: 0000000000022000 [ 685.127300][T23288] [ 685.130596][T23288] Kernel Offset: disabled [ 685.134908][T23288] Rebooting in 86400 seconds..