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") [ 433.280719][T11587] loop1: detected capacity change from 0 to 64 [ 433.330349][T11590] loop5: detected capacity change from 0 to 64 [ 433.338473][T11592] loop2: detected capacity change from 0 to 64 11:19:42 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = openat$mice(0xffffffffffffff9c, &(0x7f00000022c0), 0x28001) copy_file_range(r0, &(0x7f0000000000)=0xd3, r1, &(0x7f0000002300)=0xc, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002340)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000157d9df4aaaf62ba39f68d669b4d168c18189d0e65406917a6becc816f050f643b3b0ed0d41f8f63904edd7481723b4edf7b"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000002340)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000157d9df4aaaf62ba39f68d669b4d168c18189d0e65406917a6becc816f050f643b3b0ed0d41f8f63904edd7481723b4edf7b"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000002280)='./file0/file0\x00', 0xc201, 0x20) creat(&(0x7f0000000080)='./file0\x00', 0x2) (async) creat(&(0x7f0000000080)='./file0\x00', 0x2) 11:19:42 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) [ 433.394484][T11598] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 433.535418][T11604] loop1: detected capacity change from 0 to 64 [ 433.621081][T11607] loop3: detected capacity change from 0 to 2048 [ 433.702267][T11609] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 434.184689][T11595] loop4: detected capacity change from 0 to 32768 [ 434.334780][T11611] loop0: detected capacity change from 0 to 32768 [ 434.404897][T11611] XFS (loop0): Mounting V5 Filesystem ca7e2101-b8f1-4838-8e2d-7637b90620e6 [ 434.443650][T11611] XFS (loop0): Ending clean mount [ 434.450197][T11611] XFS (loop0): Quotacheck needed: Please wait. [ 434.480218][T11611] XFS (loop0): Quotacheck: Done. 11:19:43 executing program 0: mknodat(0xffffffffffffff9c, 0x0, 0xfa3c3d2b1886701e, 0x0) 11:19:43 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./bus\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1400, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:43 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ftruncate(r0, 0x0) 11:19:43 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = openat$mice(0xffffffffffffff9c, &(0x7f00000022c0), 0x28001) copy_file_range(r0, &(0x7f0000000000)=0xd3, r1, &(0x7f0000002300)=0xc, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002340)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000157d9df4aaaf62ba39f68d669b4d168c18189d0e65406917a6becc816f050f643b3b0ed0d41f8f63904edd7481723b4edf7b"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000002280)='./file0/file0\x00', 0xc201, 0x20) creat(&(0x7f0000000080)='./file0\x00', 0x2) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) openat$mice(0xffffffffffffff9c, &(0x7f00000022c0), 0x28001) (async) copy_file_range(r0, &(0x7f0000000000)=0xd3, r1, &(0x7f0000002300)=0xc, 0x2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000002340)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000157d9df4aaaf62ba39f68d669b4d168c18189d0e65406917a6becc816f050f643b3b0ed0d41f8f63904edd7481723b4edf7b"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000002280)='./file0/file0\x00', 0xc201, 0x20) (async) creat(&(0x7f0000000080)='./file0\x00', 0x2) (async) 11:19:43 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) 11:19:43 executing program 4: io_uring_setup(0x0, &(0x7f0000000000)) 11:19:43 executing program 4: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x801c581f, &(0x7f0000000080)) [ 434.512363][T11611] overlayfs: failed to resolve './f': -2 [ 434.535420][ T5020] XFS (loop0): Unmounting Filesystem ca7e2101-b8f1-4838-8e2d-7637b90620e6 [ 434.579763][T11625] loop5: detected capacity change from 0 to 64 [ 434.599903][T11629] loop1: detected capacity change from 0 to 64 [ 434.624834][T11628] loop2: detected capacity change from 0 to 64 11:19:43 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (rerun: 64) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) ftruncate(r0, 0x0) [ 434.702094][T11627] loop3: detected capacity change from 0 to 2048 11:19:43 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./bus\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1400, 0x0) (async, rerun: 32) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (rerun: 32) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 434.774884][T11631] loop4: detected capacity change from 0 to 2048 [ 434.823259][T11637] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:19:44 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) [ 434.902993][T11639] loop2: detected capacity change from 0 to 64 11:19:44 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x100072}, 0x20) [ 435.009835][T11643] loop5: detected capacity change from 0 to 64 [ 435.016207][T11645] NILFS (loop4): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:19:44 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x44240, 0x0) 11:19:44 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ftruncate(r0, 0x0) 11:19:44 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./bus\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./bus\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1400, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:44 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) [ 435.188821][T11646] loop3: detected capacity change from 0 to 2048 [ 435.277447][T11657] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 435.312607][T11659] loop5: detected capacity change from 0 to 64 [ 435.326084][T11664] loop2: detected capacity change from 0 to 64 [ 435.334664][ T27] kauditd_printk_skb: 17 callbacks suppressed [ 435.334679][ T27] audit: type=1800 audit(1688296784.530:477): pid=11660 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1969 res=0 errno=0 11:19:44 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f090000007562dbdc30003d0cff6159f5961766bc0bbcb566ef15c55c9e3fa3d25ab460d0fabf738d318c8d9cf74d0e37a695a906662b044ca24c7cc275765462de57e3e93df08f86923a17c6203cae6e1af713ae4e2e36f78147e46fb2de2253fbcc0aaa477d0ec65611ac2d0f674f88aef4a3deaab0d87988163749817e95339d670c8222991a165ae2bef309fc6fc9d31e9c03ae68a7a8a5d7f538b916985157935a643c2310d4d0efa4594292feee219c5d87c2a7f6610af6a1303ef08d8db6dd3c9a0de2502e64185d55e5040ea5f029bfc92c95b6fed8396877daa5a3db57cb499d05e7d331193a932be505cb"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000003780)='blkio.bfq.dequeue\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000037c0)=[r4, r1, r0, r0], 0x4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000240)={0x2020}, 0x2020) r6 = open(&(0x7f0000000200)='./file1\x00', 0x10102, 0x2) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000002380)={0x0, 0x4, 0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000002780)={r7, "c81ae3ffe8e33d1526140f000d1ab54b"}) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:44 executing program 0: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 11:19:44 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40106e8c, 0x0) 11:19:44 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 11:19:44 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) fspick(r0, &(0x7f0000000080)='./bus\x00', 0x1) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:44 executing program 4: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0xa843, 0x0) 11:19:44 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) mount(&(0x7f0000000200)=@nullb, &(0x7f0000002280)='./file1\x00', &(0x7f00000022c0)='aio\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) read$FUSE(r2, &(0x7f0000002300)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) fcntl$lock(r2, 0x5, &(0x7f0000004340)={0x1, 0x2, 0x81, 0x6, r3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:44 executing program 0: syz_mount_image$xfs(&(0x7f0000009700), &(0x7f0000009740)='./file0\x00', 0x0, &(0x7f0000000280)={[{@swalloc}, {@gqnoenforce}, {@largeio}]}, 0x1, 0x970e, &(0x7f000001c5c0)="$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") chdir(0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) open(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000840)='./bus\x00', &(0x7f0000001900), 0x0) [ 435.482328][T11674] loop5: detected capacity change from 0 to 64 11:19:44 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) fspick(r0, &(0x7f0000000080)='./bus\x00', 0x1) (async, rerun: 64) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async, rerun: 64) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 435.576027][T11679] loop1: detected capacity change from 0 to 64 [ 435.584058][T11680] loop2: detected capacity change from 0 to 64 [ 435.606667][T11671] loop3: detected capacity change from 0 to 2048 11:19:44 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x40142, 0x0) 11:19:44 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f090000007562dbdc30003d0cff6159f5961766bc0bbcb566ef15c55c9e3fa3d25ab460d0fabf738d318c8d9cf74d0e37a695a906662b044ca24c7cc275765462de57e3e93df08f86923a17c6203cae6e1af713ae4e2e36f78147e46fb2de2253fbcc0aaa477d0ec65611ac2d0f674f88aef4a3deaab0d87988163749817e95339d670c8222991a165ae2bef309fc6fc9d31e9c03ae68a7a8a5d7f538b916985157935a643c2310d4d0efa4594292feee219c5d87c2a7f6610af6a1303ef08d8db6dd3c9a0de2502e64185d55e5040ea5f029bfc92c95b6fed8396877daa5a3db57cb499d05e7d331193a932be505cb"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000003780)='blkio.bfq.dequeue\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000c02) (async) fallocate(r4, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000037c0)=[r4, r1, r0, r0], 0x4) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r5, &(0x7f0000000240)={0x2020}, 0x2020) r6 = open(&(0x7f0000000200)='./file1\x00', 0x10102, 0x2) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000002380)={0x0, 0x4, 0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000002780)={r7, "c81ae3ffe8e33d1526140f000d1ab54b"}) (async) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000002780)={r7, "c81ae3ffe8e33d1526140f000d1ab54b"}) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 435.635342][ T27] audit: type=1804 audit(1688296784.830:478): pid=11679 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4151449802/syzkaller.qMlj6B/319/file0/file0" dev="loop1" ino=4 res=1 errno=0 [ 435.694767][T11684] loop5: detected capacity change from 0 to 64 [ 435.734698][T11688] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:19:44 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) mount(&(0x7f0000000200)=@nullb, &(0x7f0000002280)='./file1\x00', &(0x7f00000022c0)='aio\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) read$FUSE(r2, &(0x7f0000002300)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) fcntl$lock(r2, 0x5, &(0x7f0000004340)={0x1, 0x2, 0x81, 0x6, r3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) mount(&(0x7f0000000200)=@nullb, &(0x7f0000002280)='./file1\x00', &(0x7f00000022c0)='aio\x00', 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) read$FUSE(r2, &(0x7f0000002300)={0x2020}, 0x2020) (async) fcntl$lock(r2, 0x5, &(0x7f0000004340)={0x1, 0x2, 0x81, 0x6, r3}) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) 11:19:44 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x105002, 0x0) 11:19:44 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40106e8c, 0x0) [ 435.741722][ T27] audit: type=1800 audit(1688296784.890:479): pid=11685 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1971 res=0 errno=0 11:19:45 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) fspick(r0, &(0x7f0000000080)='./bus\x00', 0x1) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 435.816902][T11693] loop1: detected capacity change from 0 to 64 11:19:45 executing program 4: mkdir(&(0x7f0000001e00)='./file0\x00', 0x0) [ 435.871338][T11697] loop2: detected capacity change from 0 to 64 [ 435.911438][ T27] audit: type=1804 audit(1688296785.100:480): pid=11700 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4151449802/syzkaller.qMlj6B/320/file0/file0" dev="loop1" ino=4 res=1 errno=0 11:19:45 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f090000007562dbdc30003d0cff6159f5961766bc0bbcb566ef15c55c9e3fa3d25ab460d0fabf738d318c8d9cf74d0e37a695a906662b044ca24c7cc275765462de57e3e93df08f86923a17c6203cae6e1af713ae4e2e36f78147e46fb2de2253fbcc0aaa477d0ec65611ac2d0f674f88aef4a3deaab0d87988163749817e95339d670c8222991a165ae2bef309fc6fc9d31e9c03ae68a7a8a5d7f538b916985157935a643c2310d4d0efa4594292feee219c5d87c2a7f6610af6a1303ef08d8db6dd3c9a0de2502e64185d55e5040ea5f029bfc92c95b6fed8396877daa5a3db57cb499d05e7d331193a932be505cb"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r2 = openat$cgroup_ro(r1, &(0x7f0000003780)='blkio.bfq.dequeue\x00', 0x0, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000c02) (async) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) (async) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000037c0)=[r4, r1, r0, r0], 0x4) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000240)={0x2020}, 0x2020) r6 = open(&(0x7f0000000200)='./file1\x00', 0x10102, 0x2) (async) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000002380)={0x0, 0x4, 0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000002780)={r7, "c81ae3ffe8e33d1526140f000d1ab54b"}) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 435.971932][T11703] loop5: detected capacity change from 0 to 64 11:19:45 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) fstat(r2, &(0x7f0000002380)) getdents64(r2, &(0x7f0000002280)=""/255, 0xff) 11:19:45 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x83f449abbee950af, 0x0) [ 436.021641][T11702] loop3: detected capacity change from 0 to 2048 [ 436.028785][ T27] audit: type=1800 audit(1688296785.100:481): pid=11704 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1970 res=0 errno=0 [ 436.115813][T11716] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 436.137972][T11718] loop5: detected capacity change from 0 to 64 [ 436.151946][T11719] loop1: detected capacity change from 0 to 64 [ 436.260082][ T27] audit: type=1804 audit(1688296785.450:482): pid=11718 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3324177784/syzkaller.A4WWgK/321/file0/file0" dev="loop5" ino=4 res=1 errno=0 [ 436.778191][T11682] loop0: detected capacity change from 0 to 32768 [ 436.820513][T11682] XFS (loop0): Mounting V5 Filesystem ca7e2101-b8f1-4838-8e2d-7637b90620e6 [ 436.854456][T11682] XFS (loop0): Ending clean mount [ 436.862192][T11682] XFS (loop0): Quotacheck needed: Please wait. [ 436.900281][T11682] XFS (loop0): Quotacheck: Done. 11:19:46 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40106e8c, 0x0) 11:19:46 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) mount(&(0x7f0000000200)=@nullb, &(0x7f0000002280)='./file1\x00', &(0x7f00000022c0)='aio\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) read$FUSE(r2, &(0x7f0000002300)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) fcntl$lock(r2, 0x5, &(0x7f0000004340)={0x1, 0x2, 0x81, 0x6, r3}) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:46 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x17133e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:46 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e40)='./cgroup.net/syz0\x00', 0x200002, 0x0) 11:19:46 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000005e40), 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') close(r0) 11:19:46 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async, rerun: 64) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async, rerun: 64) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async, rerun: 32) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async, rerun: 32) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (async, rerun: 32) fallocate(r2, 0x0, 0x0, 0x110001) (rerun: 32) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) (async, rerun: 64) fstat(r2, &(0x7f0000002380)) (async, rerun: 64) getdents64(r2, &(0x7f0000002280)=""/255, 0xff) [ 436.931251][ T27] audit: type=1800 audit(1688296786.120:483): pid=11682 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=1290 res=0 errno=0 [ 436.951736][ T27] audit: type=1800 audit(1688296786.120:484): pid=11682 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=1290 res=0 errno=0 11:19:46 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) fstat(r2, &(0x7f0000002380)) (async) getdents64(r2, &(0x7f0000002280)=""/255, 0xff) 11:19:46 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001140), 0x4000, 0x0) [ 437.016693][ T5020] XFS (loop0): Unmounting Filesystem ca7e2101-b8f1-4838-8e2d-7637b90620e6 [ 437.030772][T11740] loop1: detected capacity change from 0 to 64 [ 437.040058][ T27] audit: type=1800 audit(1688296786.240:485): pid=11736 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1971 res=0 errno=0 11:19:46 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x17133e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:46 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="0e6465762f6c6f6f703000"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 437.160292][ T27] audit: type=1800 audit(1688296786.270:486): pid=11743 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1949 res=0 errno=0 [ 437.192316][T11742] loop3: detected capacity change from 0 to 2048 11:19:46 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f64650ec700000000000000800000000000001605f1e7"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000002380)={0x1, 0x81}) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) r3 = openat$smackfs_cipsonum(0xffffffffffffff9c, &(0x7f0000000080)='/sys/fs/smackfs/direct\x00', 0x2, 0x0) write$binfmt_script(r3, &(0x7f0000002280)={'#! ', './bus', [{0x20, 'bfs\x00'}, {}, {0x20, '/proc/crypto\x00'}, {}, {}, {0x20, 'bfs\x00'}, {0x20, '&-.:!-[!++f'}], 0xa, "b9c51e30a1aab790c3a41bf6b386555ca12e49e82a1e852470bd5d5c3540a25f8479454b779a550e8b1b07b73793b9afb3a533dbbeda3106ba366ad6b9158e4fb850a7a4768f160ad288f8f493a3ac0eff45717cfe9d5fc58cda02470ff0126cf90170c740a2f9c2ab50d2b89557c121e21928d09292e078d3a036e750ba1de4cb5a75efc5cfdde14cdff38b4e3993a43e8bf7a471f6c3941447346c553a32bd5d1b7d6b5d40c70d17a3df2243ec5453a62a5e"}, 0xe3) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:46 executing program 4: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001240)='syz0\x00', 0x1ff) [ 437.279875][T11757] loop1: detected capacity change from 0 to 64 [ 437.306292][T11759] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:19:46 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) 11:19:46 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/ipc\x00') [ 437.358138][T11762] loop2: detected capacity change from 0 to 64 11:19:46 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x17133e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 437.400694][T11767] loop5: detected capacity change from 0 to 64 11:19:46 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="0e6465762f6c6f6f703000"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 437.514720][T11773] loop1: detected capacity change from 0 to 64 [ 437.601204][T11777] loop2: detected capacity change from 0 to 64 11:19:46 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f00000009c0)='syz1\x00', 0x200002, 0x0) 11:19:46 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) 11:19:46 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) 11:19:46 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f64650ec700000000000000800000000000001605f1e7"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) (async) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000002380)={0x1, 0x81}) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) r3 = openat$smackfs_cipsonum(0xffffffffffffff9c, &(0x7f0000000080)='/sys/fs/smackfs/direct\x00', 0x2, 0x0) write$binfmt_script(r3, &(0x7f0000002280)={'#! ', './bus', [{0x20, 'bfs\x00'}, {}, {0x20, '/proc/crypto\x00'}, {}, {}, {0x20, 'bfs\x00'}, {0x20, '&-.:!-[!++f'}], 0xa, "b9c51e30a1aab790c3a41bf6b386555ca12e49e82a1e852470bd5d5c3540a25f8479454b779a550e8b1b07b73793b9afb3a533dbbeda3106ba366ad6b9158e4fb850a7a4768f160ad288f8f493a3ac0eff45717cfe9d5fc58cda02470ff0126cf90170c740a2f9c2ab50d2b89557c121e21928d09292e078d3a036e750ba1de4cb5a75efc5cfdde14cdff38b4e3993a43e8bf7a471f6c3941447346c553a32bd5d1b7d6b5d40c70d17a3df2243ec5453a62a5e"}, 0xe3) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:46 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x2000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000002280)=0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) fcntl$getflags(r4, 0x3) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:46 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="0e6465762f6c6f6f703000"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="0e6465762f6c6f6f703000"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:47 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) 11:19:47 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x450a00, 0x0) [ 437.809019][T11790] loop2: detected capacity change from 0 to 64 [ 437.817301][T11789] loop1: detected capacity change from 0 to 64 [ 437.839095][T11791] loop5: detected capacity change from 0 to 64 11:19:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xe5b5) 11:19:47 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000200)='./file1\x00', 0x6b4000, 0x74) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:47 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x2000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000002280)=0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000c02) (async) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) (async) fcntl$getflags(r4, 0x3) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$eJzs3U1sXEcdAPB5a69TtynZlISaNLQJhbZ81G4cN3xE0FTNhaipuFWquERpWiLSgEglaNVDkhM3WlXhyoc49VIBQqIXFPXEpRKNxKWnwoEDUZAqcYBCYhR7Zr3+Z1dv10m8Xu/vJ41n583szrz127dv33szk4Cx1Vj6u7AwU6V04Z03D//job9PX1/yRLtEa+nvZEeqmVKqcnoyvN6HE8vx1Y9eO94trtL80t+STs9caT/3rpTS2bQnXUyttOvCpTfem3/66Lkj5/e+/9bBy7dn7QEAYLx8++LBhZ1//fN92z9++/5DaUt7eTk+b+X01nzcfygf+Jfj/0Zana46QqepUG4yh0YoN9GlXGc9zVBuskf9U+F1mz3Kbampf6JjWbf1hlFWtuNWqhqzq9KNxuzs8m/ytPS7fqqaPX3y1AtnhtRQ4Jb71wMppT2CIIxjWNw27D0QwLJ4vfAGZ+OZhZuz/Gpn2ycS6uq/8mSjy/Ph1ljv7V/9o1X/r8/Z43DrbNatqaxX+Rxtzel4HSHevzTo57+8Xrwe0eyznb2uI4zK9YVe7ZxY53asVa/2x+1is/pGjsv78M2Q3/n5if/TUfkfA939e8zO/7f3WRugLYIw7LA43N0PsIHF++YWs5If7+uL+Vtq8u+oyZ+uyb+zJv+umnwYZ797+afp9Wrld378TT/o+bBynu3uHH9iwPbE85GD1h/v+x3UzdYf7yeGjewPx5498dXnn7u0fP9/1d7+r+XtfU9Ot/Jn62IuUM4XxvPq7Xv/W6vrafQod09oz91dyi893rG6XLVj5XVSx37mhnbMrH7etl7ldq8u1wrlpnO4I7R3Ouwz7gzPK8cfZb9a3q/JsL7NsB5ToR1lv7I9x7EdsBZle+x1/3/ZPmdSs3rh5KkTj+V02U7/NNHccn35vnVuN3Dz+u3/M5NW9//Z2l7ebHTuF7atLK869wutsHy+x/L9OV2+5747Mb20fPb49089f6tXHsbcmVde/d6xU6dO/NADDzzwoP1g2Hsm4Habe/mlH8ydeeXVR0++dOzFEy+eOL3/wIH98/MHvrZ/YW7puH6u8+ge2ExWvvSH3RIAAAAAAAAAAACgXz86cvjSX979ygfL/f9X+v+V/v/lzt/S//8nof9/7Cdf+sKXfoDbu+RXKU3GAVanQrlmDp8M7d0R6tkZnvepHLfn8cv9/0t1cVzX0v//3rA8jt9byoXhBG4YL2UqjEES5wv8bI7P5/hXCYaomu6+OMd141uXbb2MT2FcitFU/m9layjjmJT+373GdSr7/+3r0EZuvfXoTjjsdQS6++eYjf8tCMJKWFw0iwewMQxn/s+VExvlvGeJT//xW3dcD6XYlSdX7y/j+KVwMzb6/JPq31zzf7bnv+t7/xdmzGutrd7//PzyBx3Vpl391h/Xv4wDvWOw+j/O9Ze1eTj1V//iL0P98YJQn/4b6r+zz/pvWP/da6v/f7n+8rY98mC/9S+3uGqsbkc8b1yu/8XzxsXVsP5lbM+B13+NEzVey/XDOBuVeWYHNSrz//YS78N4PKfLjrDc5xDnOxm0/eX+ivI9sDO8flXz/Wb+39H29RzXfR7K/L9le2x1STc60s0u7+1m3dfAqPrQ9T9BGNuwuLh4e09o1Rhq5Qz9/R/274Rh1z/s979OnP939TH84zfM/xuP8eP8vzE/zv8b8+P8vzE/zv8b3884/2/Mvze8bpwfeKYm/9Mr+Re75e+qef59Nfm7a/I/U5O/tyb//pr8B2ry76nJf7Am/3M1+Z+vyX+oJv+Rmvwv1ORvdqU/yriuP4yz2D/P5x/GR7n+0+vzv6MmHxhdP3t731PP/fY7reX+/1Pt8yHlOt6hnG7m384/zul43Tt1pK/nvZvTfwv5G/18B4yTOH5G/H5/uCYfGF3lPi+fbxhDVfcRe/odt6rXcT6j5Ys5/lKOv5zjR3M8m+O5HO/L8fw6tY/b46nf/P7g69XK7/1tIb/f+8ljf6A4TtT+PtsTzw8Mej97HMdvUDdb/xq7gwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAxNY+nvwsJMldKFd948/OzRk3PXlzzRLtFa+jvZkWq2n5fSYzmeyPEv8oOrH712vDO+luMqzacqVe3l6Zkr7ZruSimdTXvSxdRKuy5ceuO9+aePnjtyfu/7bx28fPveAQAAANj8/h8AAP//SgoO2Q==") r0 = open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) 11:19:47 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x1000, 0x3) 11:19:47 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f64650ec700000000000000800000000000001605f1e7"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000002380)={0x1, 0x81}) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) r3 = openat$smackfs_cipsonum(0xffffffffffffff9c, &(0x7f0000000080)='/sys/fs/smackfs/direct\x00', 0x2, 0x0) write$binfmt_script(r3, &(0x7f0000002280)={'#! ', './bus', [{0x20, 'bfs\x00'}, {}, {0x20, '/proc/crypto\x00'}, {}, {}, {0x20, 'bfs\x00'}, {0x20, '&-.:!-[!++f'}], 0xa, "b9c51e30a1aab790c3a41bf6b386555ca12e49e82a1e852470bd5d5c3540a25f8479454b779a550e8b1b07b73793b9afb3a533dbbeda3106ba366ad6b9158e4fb850a7a4768f160ad288f8f493a3ac0eff45717cfe9d5fc58cda02470ff0126cf90170c740a2f9c2ab50d2b89557c121e21928d09292e078d3a036e750ba1de4cb5a75efc5cfdde14cdff38b4e3993a43e8bf7a471f6c3941447346c553a32bd5d1b7d6b5d40c70d17a3df2243ec5453a62a5e"}, 0xe3) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:47 executing program 0: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 438.111672][T11811] loop1: detected capacity change from 0 to 64 [ 438.111916][T11810] loop2: detected capacity change from 0 to 64 11:19:47 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x20, 0x0) [ 438.156436][T11814] loop5: detected capacity change from 0 to 64 11:19:47 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000200)) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000002280)={0x0, 0x5, 0x40, 0x1}) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) sendfile(r0, r0, &(0x7f0000002680)=0x8, 0xb26472d) fstatfs(r1, &(0x7f0000000080)=""/8) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:47 executing program 4: msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4) 11:19:47 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x2000) (async) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x2000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000002280)=0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) fcntl$getflags(r4, 0x3) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 438.237470][T11813] loop3: detected capacity change from 0 to 2048 11:19:47 executing program 0: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x4010, 0xffffffffffffffff, 0x0) 11:19:47 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000200)='./file1\x00', 0x6b4000, 0x74) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) [ 438.300103][T11826] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:19:47 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x185080, 0x0) [ 438.369301][T11830] loop1: detected capacity change from 0 to 64 11:19:47 executing program 0: r0 = io_uring_setup(0x52ab, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r0, 0xe, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x0, 0x1}, 0x20) 11:19:47 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x581800, 0x80) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:47 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000200)='./file1\x00', 0x6b4000, 0x74) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 438.444708][T11835] loop5: detected capacity change from 0 to 64 11:19:47 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async, rerun: 32) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 32) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000200)) (async) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async, rerun: 32) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000002280)={0x0, 0x5, 0x40, 0x1}) (rerun: 32) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) sendfile(r0, r0, &(0x7f0000002680)=0x8, 0xb26472d) fstatfs(r1, &(0x7f0000000080)=""/8) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:47 executing program 4: msync(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x3) [ 438.580880][T11848] loop1: detected capacity change from 0 to 64 [ 438.605941][T11842] loop3: detected capacity change from 0 to 2048 [ 438.608064][T11851] loop2: detected capacity change from 0 to 64 11:19:47 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), 0x0, 0x0) 11:19:47 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) [ 438.632414][T11855] loop5: detected capacity change from 0 to 64 11:19:47 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x581800, 0x80) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x581800, 0x80) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) 11:19:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) name_to_handle_at(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280)=@FILEID_BTRFS_WITH_PARENT_ROOT={0x28, 0x4e, {0xb0, 0x3, 0xffff, 0x20, 0x6, 0x1}}, &(0x7f00000022c0), 0x400) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:47 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000200)) (async) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000002280)={0x0, 0x5, 0x40, 0x1}) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) sendfile(r0, r0, &(0x7f0000002680)=0x8, 0xb26472d) fstatfs(r1, &(0x7f0000000080)=""/8) (async) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) 11:19:47 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, 0x0) [ 438.720158][T11862] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:19:47 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002540), 0x149002, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000002c0)={0x18}, 0x18) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) [ 438.810922][T11867] loop1: detected capacity change from 0 to 64 11:19:48 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000008540), 0x1, 0x0) fcntl$setsig(r0, 0xa, 0x0) [ 438.853177][T11872] loop5: detected capacity change from 0 to 64 [ 438.875360][T11874] loop2: detected capacity change from 0 to 64 11:19:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0xcac40, 0x8c) 11:19:48 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x581800, 0x80) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x581800, 0x80) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:48 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) move_mount(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:48 executing program 4: r0 = syz_io_uring_setup(0x44e7, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_IOWQ_AFF(r0, 0x11, 0x0, 0x0) [ 439.008882][T11876] loop3: detected capacity change from 0 to 2048 [ 439.051986][T11893] loop1: detected capacity change from 0 to 64 [ 439.090411][T11896] loop5: detected capacity change from 0 to 64 11:19:48 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40106e8c, 0x0) 11:19:48 executing program 0: r0 = syz_io_uring_setup(0x44e7, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_IOWQ_AFF(r0, 0x11, &(0x7f0000000100)='1', 0x1) [ 439.098903][T11897] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 439.317251][T11902] loop3: detected capacity change from 0 to 2048 [ 439.373399][T11904] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:19:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) name_to_handle_at(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280)=@FILEID_BTRFS_WITH_PARENT_ROOT={0x28, 0x4e, {0xb0, 0x3, 0xffff, 0x20, 0x6, 0x1}}, &(0x7f00000022c0), 0x400) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) fallocate(r1, 0x0, 0x0, 0x2000c02) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) (async) name_to_handle_at(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280)=@FILEID_BTRFS_WITH_PARENT_ROOT={0x28, 0x4e, {0xb0, 0x3, 0xffff, 0x20, 0x6, 0x1}}, &(0x7f00000022c0), 0x400) (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) 11:19:49 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) 11:19:49 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) fcntl$addseals(r0, 0x409, 0x8) fstatfs(r1, &(0x7f0000002280)=""/175) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$FUSE_POLL(r1, &(0x7f0000000200)={0x18, 0x0, r2, {0x20}}, 0x18) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:49 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) (async) move_mount(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x4) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:49 executing program 0: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x402, &(0x7f0000000040)) 11:19:49 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40106e8c, 0x0) [ 440.104941][ T1207] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.111364][ T1207] ieee802154 phy1 wpan1: encryption failed: -22 11:19:49 executing program 4: openat$audio1(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) [ 440.178228][T11910] loop1: detected capacity change from 0 to 64 11:19:49 executing program 0: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) flock(r0, 0x8) 11:19:49 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) (async) fcntl$addseals(r0, 0x409, 0x8) (async) fstatfs(r1, &(0x7f0000002280)=""/175) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$FUSE_POLL(r1, &(0x7f0000000200)={0x18, 0x0, r2, {0x20}}, 0x18) (async) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 440.250469][T11914] loop5: detected capacity change from 0 to 64 11:19:49 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) move_mount(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x4) (async) move_mount(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 440.326571][T11909] loop3: detected capacity change from 0 to 2048 11:19:49 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001100), 0x103801, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 11:19:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/exec\x00') write$damon_init_regions(r0, 0x0, 0x0) [ 440.410819][T11924] loop1: detected capacity change from 0 to 64 [ 440.469251][T11925] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 440.565825][T11935] loop5: detected capacity change from 0 to 64 [ 440.673670][ T27] kauditd_printk_skb: 14 callbacks suppressed [ 440.673685][ T27] audit: type=1804 audit(1688296789.870:501): pid=11935 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3324177784/syzkaller.A4WWgK/332/file0/file0" dev="loop5" ino=4 res=1 errno=0 [ 440.870810][T11938] loop2: detected capacity change from 0 to 64 [ 440.920637][ T27] audit: type=1800 audit(1688296790.110:502): pid=11938 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1954 res=0 errno=0 [ 440.952876][ T27] audit: type=1804 audit(1688296790.140:503): pid=11938 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir2922901718/syzkaller.5LW5XA/330/file0" dev="sda1" ino=1953 res=1 errno=0 [ 441.018922][ T27] audit: type=1804 audit(1688296790.210:504): pid=11940 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir2922901718/syzkaller.5LW5XA/330/file0" dev="sda1" ino=1953 res=1 errno=0 11:19:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) name_to_handle_at(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280)=@FILEID_BTRFS_WITH_PARENT_ROOT={0x28, 0x4e, {0xb0, 0x3, 0xffff, 0x20, 0x6, 0x1}}, &(0x7f00000022c0), 0x400) (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:50 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40106e8c, 0x0) 11:19:50 executing program 0: r0 = openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syncfs(r0) 11:19:50 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) fcntl$addseals(r0, 0x409, 0x8) (async) fstatfs(r1, &(0x7f0000002280)=""/175) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$FUSE_POLL(r1, &(0x7f0000000200)={0x18, 0x0, r2, {0x20}}, 0x18) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') fcntl$setflags(r0, 0x2, 0x0) 11:19:50 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 441.055358][ T27] audit: type=1800 audit(1688296790.240:505): pid=11938 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=1953 res=0 errno=0 [ 441.079996][ T27] audit: type=1804 audit(1688296790.280:506): pid=11939 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir2922901718/syzkaller.5LW5XA/330/file0" dev="sda1" ino=1953 res=1 errno=0 [ 441.157499][T11952] loop1: detected capacity change from 0 to 64 11:19:50 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000002780), 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) 11:19:50 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000003400), 0x2, 0x0) readv(r0, 0x0, 0x0) [ 441.205895][T11950] loop5: detected capacity change from 0 to 64 11:19:50 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000d6d51a80bf1cd664d6d451a7d858d70d7b5ec0b9efb9dbcc7f72dcd61b38302ac5b89c7dedd6cb22c78045a7bc998cbb"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xc, r3, 0x0, 0x0, 0x80}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002340)=ANY=[], 0x1e09f46) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r4, 0xc0286687, &(0x7f0000002300)={0x1, 0x0, 0x52, &(0x7f0000002280)=""/82}) 11:19:50 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 441.292335][T11959] loop2: detected capacity change from 0 to 64 [ 441.304354][ T27] audit: type=1800 audit(1688296790.500:507): pid=11961 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1960 res=0 errno=0 [ 441.320056][T11949] loop3: detected capacity change from 0 to 2048 11:19:50 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$nci(r0, 0x0, 0x0) 11:19:50 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f0000000200)='./bus\x00', &(0x7f0000002280)='sysv\x00', 0x40000, &(0x7f00000022c0)=':\\-\\\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:50 executing program 0: r0 = openat$smackfs_netlabel(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) fcntl$setown(r0, 0x8, 0x0) [ 441.409225][ T27] audit: type=1804 audit(1688296790.530:508): pid=11950 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3324177784/syzkaller.A4WWgK/333/file0/file0" dev="loop5" ino=4 res=1 errno=0 11:19:50 executing program 3: r0 = syz_io_uring_setup(0xd9a, &(0x7f00000000c0)={0x0, 0x0, 0x40}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f00000001c0), 0x0) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xc, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, 0x0, 0x0) [ 441.463661][T11967] NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 441.477035][T11969] loop1: detected capacity change from 0 to 64 11:19:50 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) 11:19:50 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mount$binder(0x0, &(0x7f0000002380)='./file0\x00', 0x0, 0x2252026, 0x0) [ 441.552730][ T27] audit: type=1800 audit(1688296790.730:509): pid=11974 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1945 res=0 errno=0 [ 441.568181][T11978] loop2: detected capacity change from 0 to 64 11:19:50 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f0000000200)='./bus\x00', &(0x7f0000002280)='sysv\x00', 0x40000, &(0x7f00000022c0)=':\\-\\\x00') (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:50 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200), 0x181002) write$tcp_mem(r0, 0x0, 0x0) 11:19:50 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000d6d51a80bf1cd664d6d451a7d858d70d7b5ec0b9efb9dbcc7f72dcd61b38302ac5b89c7dedd6cb22c78045a7bc998cbb"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) (async) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000c02) (async) fallocate(r3, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xc, r3, 0x0, 0x0, 0x80}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002340)=ANY=[], 0x1e09f46) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r4, 0xc0286687, &(0x7f0000002300)={0x1, 0x0, 0x52, &(0x7f0000002280)=""/82}) (async) ioctl$FS_IOC_READ_VERITY_METADATA(r4, 0xc0286687, &(0x7f0000002300)={0x1, 0x0, 0x52, &(0x7f0000002280)=""/82}) [ 441.661999][ T27] audit: type=1804 audit(1688296790.740:510): pid=11975 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3324177784/syzkaller.A4WWgK/334/file0" dev="sda1" ino=1949 res=1 errno=0 11:19:50 executing program 4: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x181802, 0x0) [ 441.708494][T11984] loop5: detected capacity change from 0 to 64 [ 441.727408][T11989] I/O error, dev loop5, sector 56 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 11:19:50 executing program 0: mount$bind(&(0x7f0000000100)='./cgroup\x00', &(0x7f0000000140)='./cgroup\x00', 0x0, 0x1008, 0x0) 11:19:50 executing program 4: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x80802, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, 0x0, 0x0) [ 441.763493][T11994] loop2: detected capacity change from 0 to 64 [ 441.778052][T11989] Buffer I/O error on dev loop5, logical block 7, lost async page write 11:19:51 executing program 3: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x1f) 11:19:51 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f0000000200)='./bus\x00', &(0x7f0000002280)='sysv\x00', 0x40000, &(0x7f00000022c0)=':\\-\\\x00') (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 441.820590][T11984] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=75622f2e) 11:19:51 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x2201, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000002280)={0x0, 0x0, "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", "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"}) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:51 executing program 0: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') faccessat2(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) [ 441.899879][T12005] loop1: detected capacity change from 0 to 64 11:19:51 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$smackfs_ptrace(r0, &(0x7f0000001d00), 0x14) write$UHID_CREATE(r0, &(0x7f00000000c0)={0x0, {'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000080)=""/25, 0x19}}, 0x120) 11:19:51 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000d6d51a80bf1cd664d6d451a7d858d70d7b5ec0b9efb9dbcc7f72dcd61b38302ac5b89c7dedd6cb22c78045a7bc998cbb"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000d6d51a80bf1cd664d6d451a7d858d70d7b5ec0b9efb9dbcc7f72dcd61b38302ac5b89c7dedd6cb22c78045a7bc998cbb"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000c02) (async) fallocate(r3, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xc, r3, 0x0, 0x0, 0x80}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002340)=ANY=[], 0x1e09f46) (async) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002340)=ANY=[], 0x1e09f46) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r4, 0xc0286687, &(0x7f0000002300)={0x1, 0x0, 0x52, &(0x7f0000002280)=""/82}) (async) ioctl$FS_IOC_READ_VERITY_METADATA(r4, 0xc0286687, &(0x7f0000002300)={0x1, 0x0, 0x52, &(0x7f0000002280)=""/82}) [ 441.942182][T12008] loop2: detected capacity change from 0 to 64 11:19:51 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 11:19:51 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:51 executing program 0: r0 = epoll_create1(0x0) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000011c0), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001200)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) [ 442.007263][T12014] loop5: detected capacity change from 0 to 64 11:19:51 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async, rerun: 32) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 32) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async, rerun: 32) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x2201, 0x0) (rerun: 32) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000002280)={0x0, 0x0, "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", "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"}) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 442.107285][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.109907][T12022] loop1: detected capacity change from 0 to 64 [ 442.126248][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.146407][T12027] loop2: detected capacity change from 0 to 64 11:19:51 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x5452, &(0x7f0000000000)) 11:19:51 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002280)='./bus\x00', &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) chown(&(0x7f0000000200)='./bus\x00', 0x0, r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) fstat(r0, &(0x7f00000043c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000004380)='.\x00', r3, r5) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x51) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 442.165384][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 11:19:51 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x787802, 0x0) 11:19:51 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 442.225861][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.252505][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.259957][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 11:19:51 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) 11:19:51 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x2201, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000002280)={0x0, 0x0, "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", "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"}) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 442.286629][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.296720][T12037] loop1: detected capacity change from 0 to 64 [ 442.342533][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.361327][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.391454][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.401137][T12042] loop2: detected capacity change from 0 to 64 [ 442.432752][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.441765][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.472801][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.480252][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.513151][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.521968][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.542529][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.549979][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.572580][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.580010][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.602555][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.609986][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.632526][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.639955][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 442.662689][ T5436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 11:19:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002140), 0x2, 0x0) write$FUSE_INIT(r0, 0x0, 0xffffffffffffff38) 11:19:51 executing program 4: statx(0xffffffffffffff9c, &(0x7f00000009c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0) 11:19:51 executing program 0: mount$overlay(0x0, &(0x7f0000001040)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x0, 0x0) 11:19:51 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000002280)='./bus\x00', &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) chown(&(0x7f0000000200)='./bus\x00', 0x0, r1) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async, rerun: 64) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) (async, rerun: 64) fstat(r0, &(0x7f00000043c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000004380)='.\x00', r3, r5) (async) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x51) (async, rerun: 32) creat(&(0x7f0000000080)='./file1\x00', 0x0) (rerun: 32) 11:19:51 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:51 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) fcntl$setflags(r1, 0x2, 0x0) faccessat(r1, &(0x7f0000000080)='\x00', 0x40) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000240)={0x2020}, 0x2020) write$binfmt_script(r0, &(0x7f0000002280)={'#! ', './file0', [{0x20, ','}], 0xa, "f141d48f8675b94cf695bc9c7e3b5489c81c28a6b8fc4240b80e672022c493dc9ddad1b73470f939ce35d9731d3f35314f1c12e99e5228516ab6a86dc63bfd4b2d29ae261540ac8668b3de7fd1eba88e9bac7c5d9595146b185561d211534fef8d27"}, 0x6f) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 442.684460][ T5436] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 [ 442.761006][T12051] loop5: detected capacity change from 0 to 64 [ 442.789170][T12056] loop2: detected capacity change from 0 to 64 11:19:52 executing program 4: mount$9p_xen(0x0, &(0x7f0000003200)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0) [ 442.807670][T12055] loop1: detected capacity change from 0 to 64 11:19:52 executing program 0: rmdir(&(0x7f00000001c0)='./file0\x00') mknod$loop(&(0x7f0000001c00)='./file0\x00', 0x0, 0x1) 11:19:52 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x24442, 0x0) r0 = open(&(0x7f0000000cc0)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='\x00', 0x1000, 0x0, &(0x7f00000000c0)) 11:19:52 executing program 2: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000240)={0x7, 0x7, 0x1, 0x1, 0x7fffffff}) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:52 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002280)='./bus\x00', &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) chown(&(0x7f0000000200)='./bus\x00', 0x0, r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) fstat(r0, &(0x7f00000043c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000004380)='.\x00', r3, r5) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x51) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000002280)='./bus\x00', &(0x7f00000022c0), 0x800) (async) chown(&(0x7f0000000200)='./bus\x00', 0x0, r1) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) (async) fstat(r0, &(0x7f00000043c0)) (async) lchown(&(0x7f0000004380)='.\x00', r3, r5) (async) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x51) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) 11:19:52 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async, rerun: 64) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async, rerun: 64) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (rerun: 64) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x110001) (async, rerun: 64) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) (async, rerun: 64) fcntl$setflags(r1, 0x2, 0x0) (async) faccessat(r1, &(0x7f0000000080)='\x00', 0x40) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000240)={0x2020}, 0x2020) (async) write$binfmt_script(r0, &(0x7f0000002280)={'#! ', './file0', [{0x20, ','}], 0xa, "f141d48f8675b94cf695bc9c7e3b5489c81c28a6b8fc4240b80e672022c493dc9ddad1b73470f939ce35d9731d3f35314f1c12e99e5228516ab6a86dc63bfd4b2d29ae261540ac8668b3de7fd1eba88e9bac7c5d9595146b185561d211534fef8d27"}, 0x6f) (async) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:52 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 11:19:52 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom1\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000008040), 0x2, 0x0) 11:19:52 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom1\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000500)) 11:19:52 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/custom1\x00', 0x1, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 11:19:52 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300), 0xa0041, 0x0) write$snapshot(r0, &(0x7f0000000340)="a1", 0x1) write$snapshot(r0, 0x0, 0x0) 11:19:52 executing program 4: symlink(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) [ 443.175091][T12084] loop1: detected capacity change from 0 to 64 [ 443.182705][T12085] loop2: detected capacity change from 0 to 64 11:19:52 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) (async) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) fcntl$setflags(r1, 0x2, 0x0) (async) fcntl$setflags(r1, 0x2, 0x0) faccessat(r1, &(0x7f0000000080)='\x00', 0x40) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/crypto\x00', 0x0, 0x0) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000240)={0x2020}, 0x2020) write$binfmt_script(r0, &(0x7f0000002280)={'#! ', './file0', [{0x20, ','}], 0xa, "f141d48f8675b94cf695bc9c7e3b5489c81c28a6b8fc4240b80e672022c493dc9ddad1b73470f939ce35d9731d3f35314f1c12e99e5228516ab6a86dc63bfd4b2d29ae261540ac8668b3de7fd1eba88e9bac7c5d9595146b185561d211534fef8d27"}, 0x6f) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:52 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x24442, 0x0) statx(r0, &(0x7f00000001c0)='\x00', 0x1000, 0x0, &(0x7f0000000200)) 11:19:52 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000001e40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) [ 443.285688][T12090] random: crng reseeded on system resumption [ 443.386186][T12094] loop5: detected capacity change from 0 to 64 11:19:52 executing program 2: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000240)={0x7, 0x7, 0x1, 0x1, 0x7fffffff}) (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) (async) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:52 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) epoll_pwait2(r0, &(0x7f0000000200)=[{}, {}], 0x2, &(0x7f0000002280)={0x0, 0x989680}, &(0x7f00000022c0)={[0x200]}, 0x8) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f00000066c0)={0x50, 0x0, r4, {0x7, 0x21}}, 0x50) read$FUSE(r3, &(0x7f000000a9c0)={0x2020}, 0x2020) read$FUSE(r3, &(0x7f0000006740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000000)={0x10, 0xffffffffffffffda, r5}, 0x10) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r3, &(0x7f00000002c0)={0x90, 0x0, r6}, 0x90) stat(&(0x7f0000002340)='./file1/file0\x00', &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000002400)={0x78, 0x0, r6, {0x16af, 0x0, 0x0, {0x2, 0x7, 0x6, 0x4, 0x8, 0x5, 0x9, 0x1f, 0x8, 0xc000, 0xabd1, r7, r2, 0x5, 0x39}}}, 0x78) r8 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r8, &(0x7f0000000040)=ANY=[], 0x208e24b) r9 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000002300), 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r9, 0x72421000) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:52 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom1\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) 11:19:52 executing program 4: faccessat2(0xffffffffffffffff, 0x0, 0x88, 0x0) 11:19:52 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0xfffffffffffffcd0) 11:19:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x279811, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESHEX=r0], 0x1, 0x92, &(0x7f0000002280)="$eJzszqENwmAUBOD7WwSqCyDYoDswCqkEh4KQMBGrMEI3QGAxJVAFElNCvk+8y8uZu9zPizTJcEqGD7v9YbPejjf8pSpJSTJPsmySqk6uq7ErqV/Z345dX9I9M7Np9wIAAN+r0r79JW072RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAH/QIAAD//3zRIec=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:52 executing program 3: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/custom1\x00', 0x2, 0x0) 11:19:52 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 11:19:52 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000100)='nv\x00', 0x3) [ 443.578344][T12110] loop1: detected capacity change from 0 to 64 [ 443.598583][T12117] loop2: detected capacity change from 0 to 64 11:19:52 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) epoll_pwait2(r0, &(0x7f0000000200)=[{}, {}], 0x2, &(0x7f0000002280)={0x0, 0x989680}, &(0x7f00000022c0)={[0x200]}, 0x8) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f00000066c0)={0x50, 0x0, r4, {0x7, 0x21}}, 0x50) (async) read$FUSE(r3, &(0x7f000000a9c0)={0x2020}, 0x2020) (async, rerun: 32) read$FUSE(r3, &(0x7f0000006740)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 32) write$FUSE_INTERRUPT(r3, &(0x7f0000000000)={0x10, 0xffffffffffffffda, r5}, 0x10) (async) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r3, &(0x7f00000002c0)={0x90, 0x0, r6}, 0x90) (async) stat(&(0x7f0000002340)='./file1/file0\x00', &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000002400)={0x78, 0x0, r6, {0x16af, 0x0, 0x0, {0x2, 0x7, 0x6, 0x4, 0x8, 0x5, 0x9, 0x1f, 0x8, 0xc000, 0xabd1, r7, r2, 0x5, 0x39}}}, 0x78) (async, rerun: 64) r8 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (rerun: 64) write$binfmt_script(r8, &(0x7f0000000040)=ANY=[], 0x208e24b) r9 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000002300), 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r9, 0x72421000) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:52 executing program 3: r0 = open$dir(&(0x7f0000000100)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000140)=""/132, 0x84) 11:19:52 executing program 2: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000240)={0x7, 0x7, 0x1, 0x1, 0x7fffffff}) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) (async) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 443.714656][T12121] loop5: detected capacity change from 0 to 64 11:19:52 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file1\x00', 0x200040, &(0x7f0000000380)={[{@fat=@nfs_nostale_ro}, {@dots}, {@fat=@discard}, {@nodots}, {@fat=@dos1xfloppy}, {@nodots}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee01}}, {@nodots}, {@fat=@gid}, {@fat=@time_offset={'time_offset', 0x3d, 0xbf}}, {@dots}, {@dots}, {@nodots}, {@fat=@flush}, {@nodots}, {@fat=@errors_remount}, {@fat=@quiet}, {@fat=@usefree}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x2}}, {@fat=@quiet}]}, 0x1, 0x1a0, &(0x7f0000000780)="$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") syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='.\x00', 0x1a404ac, &(0x7f0000000300)=ANY=[@ANYRES32=r0, @ANYRES64=r0, @ANYRES32, @ANYRES64, @ANYRES16=r0, @ANYRES16, @ANYRESDEC, @ANYRES8=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES16=r0, @ANYRESOCT=r0, @ANYRES8=0x0], 0x1, 0x0, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d00)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) close(r1) 11:19:53 executing program 4: r0 = openat$smackfs_onlycap(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x5451, 0x0) 11:19:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x279811, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESHEX=r0], 0x1, 0x92, &(0x7f0000002280)="$eJzszqENwmAUBOD7WwSqCyDYoDswCqkEh4KQMBGrMEI3QGAxJVAFElNCvk+8y8uZu9zPizTJcEqGD7v9YbPejjf8pSpJSTJPsmySqk6uq7ErqV/Z345dX9I9M7Np9wIAAN+r0r79JW072RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAH/QIAAD//3zRIec=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:53 executing program 3: openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000040), 0x600, 0x140) [ 443.852243][T12130] loop1: detected capacity change from 0 to 64 11:19:53 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)) [ 443.904643][T12137] loop0: detected capacity change from 0 to 256 11:19:53 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 443.945323][T12142] loop5: detected capacity change from 0 to 64 11:19:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') write$smackfs_ptrace(r0, 0x0, 0x0) 11:19:53 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) epoll_pwait2(r0, &(0x7f0000000200)=[{}, {}], 0x2, &(0x7f0000002280)={0x0, 0x989680}, &(0x7f00000022c0)={[0x200]}, 0x8) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (rerun: 64) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async, rerun: 64) read$FUSE(r3, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_INIT(r3, &(0x7f00000066c0)={0x50, 0x0, r4, {0x7, 0x21}}, 0x50) (async) read$FUSE(r3, &(0x7f000000a9c0)={0x2020}, 0x2020) (async) read$FUSE(r3, &(0x7f0000006740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000000)={0x10, 0xffffffffffffffda, r5}, 0x10) (async, rerun: 64) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_ENTRY(r3, &(0x7f00000002c0)={0x90, 0x0, r6}, 0x90) (async) stat(&(0x7f0000002340)='./file1/file0\x00', &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000002400)={0x78, 0x0, r6, {0x16af, 0x0, 0x0, {0x2, 0x7, 0x6, 0x4, 0x8, 0x5, 0x9, 0x1f, 0x8, 0xc000, 0xabd1, r7, r2, 0x5, 0x39}}}, 0x78) (async) r8 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r8, &(0x7f0000000040)=ANY=[], 0x208e24b) r9 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000002300), 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r9, 0x72421000) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:53 executing program 4: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) 11:19:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x279811, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESHEX=r0], 0x1, 0x92, &(0x7f0000002280)="$eJzszqENwmAUBOD7WwSqCyDYoDswCqkEh4KQMBGrMEI3QGAxJVAFElNCvk+8y8uZu9zPizTJcEqGD7v9YbPejjf8pSpJSTJPsmySqk6uq7ErqV/Z345dX9I9M7Np9wIAAN+r0r79JW072RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAH/QIAAD//3zRIec=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 444.026237][T12150] loop2: detected capacity change from 0 to 64 11:19:53 executing program 3: r0 = openat$damon_monitor_on(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x5450, 0x0) 11:19:53 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 444.156339][T12156] loop1: detected capacity change from 0 to 64 11:19:53 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0x5421, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) [ 444.213709][T12166] loop2: detected capacity change from 0 to 64 [ 444.231897][T12167] loop5: detected capacity change from 0 to 64 11:19:53 executing program 4: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 11:19:53 executing program 3: openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x282, 0x0) 11:19:53 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) fchown(r0, 0xee01, 0x0) 11:19:53 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000002340)) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) unlinkat(r1, &(0x7f0000000200)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) open(&(0x7f0000002280)='./bus\x00', 0x40000, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) fstat(r3, &(0x7f00000022c0)) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:53 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000003c0)={0x30}, 0x30) 11:19:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000046c0), 0x2, 0x0) flock(r0, 0x2) 11:19:53 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$smackfs_ptrace(r0, 0x0, 0x0) [ 444.484624][T12185] loop2: detected capacity change from 0 to 64 [ 444.524335][T12188] loop1: detected capacity change from 0 to 64 11:19:54 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000080)='./bus/file0\x00', 0x0, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:54 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2f646576ff6c6f6f703000"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000200)={0x0, 0x1, 0x9}) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:54 executing program 4: openat$damon_init_regions(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x33) 11:19:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0x894c, 0x0) 11:19:54 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f00000002c0), 0x2) readv(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:19:54 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000002340)) (async) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000002340)) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) unlinkat(r1, &(0x7f0000000200)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) open(&(0x7f0000002280)='./bus\x00', 0x40000, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) (async) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) fstat(r3, &(0x7f00000022c0)) (async) fstat(r3, &(0x7f00000022c0)) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:54 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000080)={'./binderfs/custom1\x00', 0x20, 0x0, 0x20, 0x2, 0x20, [{}, {}]}, 0x69) 11:19:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) [ 445.237345][T12198] loop2: detected capacity change from 0 to 64 [ 445.274978][T12204] loop1: detected capacity change from 0 to 64 11:19:54 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000001b80)='./file0\x00', 0x28542, 0x0) write$tcp_mem(r0, 0x0, 0x0) 11:19:54 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2f646576ff6c6f6f703000"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) (async, rerun: 32) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) (async, rerun: 32) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async, rerun: 32) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (rerun: 32) fallocate(r2, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000200)={0x0, 0x1, 0x9}) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 445.380494][T12204] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=75622f2e) 11:19:54 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000002340)) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) unlinkat(r1, &(0x7f0000000200)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000002280)='./bus\x00', 0x40000, 0x10) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) (async) fstat(r3, &(0x7f00000022c0)) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:54 executing program 4: pselect6(0x15, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) [ 445.516363][T12216] loop2: detected capacity change from 0 to 64 [ 445.615713][T12221] loop1: detected capacity change from 0 to 64 11:19:54 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000080)='./bus/file0\x00', 0x0, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:54 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x5450, 0x0) 11:19:54 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$smackfs_logging(r0, 0x0, 0x0) 11:19:54 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2f646576ff6c6f6f703000"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 32) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) (async, rerun: 32) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000200)={0x0, 0x1, 0x9}) (async, rerun: 32) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:54 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080), 0x40082) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) [ 445.685131][T12227] loop5: detected capacity change from 0 to 64 [ 445.689595][ T27] kauditd_printk_skb: 26 callbacks suppressed [ 445.689610][ T27] audit: type=1804 audit(1688296794.880:537): pid=12221 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4151449802/syzkaller.qMlj6B/345/file0/file0" dev="loop1" ino=4 res=1 errno=0 11:19:54 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x54d882, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x93e, 0x28) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) open(&(0x7f0000002300)='./file0\x00', 0x282800, 0x80) r5 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x0, r5, 0x1f, 0x0, 0x81}) write$FUSE_INTERRUPT(r4, &(0x7f00000022c0)={0x10, 0x0, r2}, 0x10) copy_file_range(r0, &(0x7f0000000200)=0x2000000000000000, 0xffffffffffffffff, &(0x7f0000002280)=0x668, 0xffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x7d3343, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mknodat$loop(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1) openat(r0, &(0x7f0000000040)='./file0\x00', 0x108480, 0x101) 11:19:55 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x5450, 0x0) [ 445.797088][T12236] loop2: detected capacity change from 0 to 64 11:19:55 executing program 4: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x48100, 0x0) 11:19:55 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000080)='./bus/file0\x00', 0x0, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 445.848841][T12238] loop5: detected capacity change from 0 to 64 [ 445.879519][T12240] loop1: detected capacity change from 0 to 64 11:19:55 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) fcntl$setpipe(r0, 0x402, 0x4000) 11:19:55 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x5451, 0x0) 11:19:55 executing program 4: write$smackfs_logging(0xffffffffffffffff, 0x0, 0x0) 11:19:55 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x54d882, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x93e, 0x28) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) open(&(0x7f0000002300)='./file0\x00', 0x282800, 0x80) (async) r5 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x110001) (async, rerun: 64) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x0, r5, 0x1f, 0x0, 0x81}) (rerun: 64) write$FUSE_INTERRUPT(r4, &(0x7f00000022c0)={0x10, 0x0, r2}, 0x10) (async, rerun: 32) copy_file_range(r0, &(0x7f0000000200)=0x2000000000000000, 0xffffffffffffffff, &(0x7f0000002280)=0x668, 0xffffffff, 0x0) (async, rerun: 32) open(&(0x7f0000000000)='./file0\x00', 0x7d3343, 0x0) (async, rerun: 32) creat(&(0x7f0000000080)='./file1\x00', 0x0) (rerun: 32) 11:19:55 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000200)='./file0\x00', 0x20000, 0x1) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:55 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) r4 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) sendfile(r2, r4, &(0x7f0000000200)=0x5, 0x0) 11:19:55 executing program 3: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1a2033, 0xffffffffffffffff, 0x0) 11:19:55 executing program 0: syz_mount_image$xfs(&(0x7f0000009700), &(0x7f0000009740)='./file0\x00', 0x0, &(0x7f0000000280)={[{@swalloc}, {@gqnoenforce}, {@largeio}]}, 0x1, 0x970e, &(0x7f000001c5c0)="$eJzs3QnYpnPBuP9nZgxjX1JJyRoiu7Lv+77ve/ZdSPYla5RsUSRkyZKSKCRbuxJRSLJGK0Il6/yPMc9kGidvvf/3+HnfzvM8jmfu+76e676e7/39XNf13PcczLXxiustOzAwxcDoxty+1q2HzjjkmqdXXvjEufZb6NrxZ3h8cPGI0TfDBx8OHzJ4O3RgYGDI4HYGlw3d66qrh456wtCxtzvJhBMPmWRgYLvBh0sP3i40+mbS7cesN3KceKCHj/pxx4/+Gv1DBwYGJhx158jZzt5/7O0Mjuum171QaRsvs9KKr1n9w23U/I03eH/sr/FHf0261cDApJsP8P4x5K19Ra/+/KUvu/iZA97icfyfaONlVlplHP9Rx+KwwWULjTrGxz0GjY27n2994O4nD07hkLHOX//n2niZFVcfeOPz/MADi+9858hXz5tD9x8YGHrAwMDQAwcGhh40MDD04IGBoYe81S71/6+3dOerqqqqt6Rlll1g2VGf98Z5PzBizPtael945VMPbzX44X/YwMDQC0Z/Fhx67sDApFu/ta+mqqqqqqqqqqhlll1gOfj8P8Wbff7f9OL1L+3zf1VVVVVVVdX/nVZZZtkFRn3WH+fz/zRv9vn/3osOemnwv/1faPSzXnlLX0NVVVVVVVVVvXnrrvHq5/+Jx/n8P8Obff4/ZtXnx/y/1WP+3uDlsTY5ZKz/nuDFsZYPG2v9F8ZaPt5Yy8def8TAwNC9Bpe/9NriofsPDAyM//r1hx762v/HPHy8sZYfNtby8cdafvio1zm4nefHWn7u4FhHrT/BWMvPH2s7I/6Vua2qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqr6V3vlietueO2a74cOjHX99n9cx33w3wUYcsVNd9zxlg30f0dDXv/vIRz+Vo/p/2+jnEdcOsPAwB4bvNVDqbegIW/1AOotLX93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yF/cG1/9feszthTssf/3gqgstd9+iy4/93J3Huj/i/+mo37L+U6//P7DzkIGBQd8pRrmuucy6688+MDCw/KL3LbfgwD++t/Co7y021bCBYa8+dfZX/xw+/A22PPXom8MHVx3cxhWvbn+VkecNGzLOIMZqiRsfuXCnjZ9bcNzbWd/4dQwdc2ed8Z49f+TIkSP/aeFgb7Sfjtn+mNcyrvPg2GcfNfZ59t19r3n2OeDAuXbefZsdt99x+z0WmX/+hRZcaN5F5p9nh513237e0X++0ZzN8Oqfw/6VOZtm3Dl7Ypmx52zc1/ZGczbDm8/Zq1s8Z/8T9hszZ+P9m3M27M3nbIadB3/Q8IHhA1u/OjdDBgaGjzd8YP9RD+abYNQeNLjuNKPWXXyqoQMDJ732Qkfdm+Af++CQw0ets/GK6y07MDDF4BpTvG5srz9Ox34pYyZ/+OAPGT44D1MMvLYrDt3rqquHjnrCP03zJBNOPGSSgYHtBh8uPXi7yOB3tx2z3shx4oGOUh5y/Oivf3hMOOrOWfsNf3Ts7bwBwf9E/63f/6/zWnjIPyZqyODX4DqjvZZZaZXXftar0zBq7oYNLltolMm4c/Y/2evGO8OIUYfXG453lWWWXWDU4nHmf8xTcP/a656rbxjctxYa/axX/tsofO5YffQ3/5Vzx8CbnzuGvXb3taXb3zbduOeO1d54iP90XIyZownGWemNzh3zHr3EYaO2P/Dm547Vdx58ua+dO4YODAwfNubcMepEMv7wgZNGPZh/1IMJhg9cPOrBAq8+mHDgplEP5t52z922G7VgxJg5mXfUdpeeasirL/7cieY4deSpI0eONziWQ8c5sQ7uHzOM/ftxmalGT9uY59J297/ypbteOXXkyPEHt3vYv7HdMc+l7c574ejvTTC43XPH2e6wN9numOeOOR5Grfrq8TD7kH/sCG9w/K44zvE7+J7x1V8XQ8b5Gn/016RbDQxMujn5/rvnHTp+p3iT8S6z7ALLjRrfG51/6fg9d4E15hzc3YYNDAy9YPTYh547MDDp1v/OWN9ovCPefLzLwnhHvNl4J7h5jbv/B8Y7ZKzx/tN+tvbRo/eVEYP72fn/xv475rnjnseGj8Uw4l85jy39uvPYEcOGjjP4sXqj90Dbwfqj70/zj60tt8sdT46Z+3GH9l+9Bxrx5uexKXYe53nrbz0whOb8itsXv33IaW8+58MH/vm9+pg5H/PcN5vzCV4/50NeN+cLv/mc/6vvO2efefT3h73JnJ9405QXjpnz8f/NOZ/g353zgYFhNOc73TJ63t7sfPpGcz7muf885+MNrDAwMDDL4JyP/6/s5/P+z+znE8H6o+8/9o9Flx8zwdRjnWOG/DtzPv6/OedrPfSP/XyWV78309CB8ccf2H+bfffde77Rf455OP/oP/lcdPE9o+f5zX6XvpHRmOe+2XEx3r9iNMP/jNG0471+/TEfOsY8HvrglcP+u+ei8f49oyFr3cTnouOeGz1vb/a+6I3mfMxz6ffgDGM9f9zPdeuu8er77onH+T34j4+w9Hvw9PsnnGfMJgef9vI4wxzze/XFsZYPG2v9F8ZaPt5Yy1/852kfutfg8pdeWzx0/1GH+OvXH3roa6zDx/pIPfSwsZaPdcobOmoXm2FwO8+Ptfzc106hw8d6ez30/LG28//nr9/+abcd83d8O497kq//1Pr7f3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8hf3Btf/P3zM9f9vXPnMywav1Tz8lJsuOfatHu9b3H/09f8Hff/p+v/HXnLTKUMH/vG9N70+++h1/lden32h0TeTbj9mvXGvD84DfePrs989z0FTDPy/uT77f6sxx+q/cB2/zv/u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/cW9w/f+bBm8PX/KuWe8cvBD68CkWOPTxt3q8b3H/0df/H/T9p+v/P37oAlMMHfjH9970+v+j13Fc/3+nO1d6aeB/8fX/xxyrXf+//ovyd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn9xfP3/IYO3AzftOmSGiUfdjnp8xpK3Xf1Wj/ct7j/1+v8jLp1hYGCPDd7qodRbUOd/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7v83eXvLn93+bvL313+7vJ3l7+7/N3l7y5/d/m7y99d/u7yd5e/u/zd5e8uf3f5u8vfXf7u8neXv7jB6/8PjL7+/5iGLN1+gcH1//9v9wb+y+SPWfyXzR+z+C+XP2bxXz5/zOK/Qv6YxX/F/DGL/0r5Yxb/lfPHLP6r5I9Z/FfNH7P4r5Y/ZvFfPX/M4r9G/pjFf838MYv/WvljFv+188cs/uvkj1n8180fs/ivlz9m8V8/f8ziv0H+mMV/w/wxi/9G+WMW/43zxyz+m+SPWfw3zR+z+G+WP2bx3zx/zOK/Rf6YxX/L/DGL/1b5Yxb/rfPHLP7b5I9Z/D+cP2bx3zZ/zOK/Xf6YxX/7/DGL/w75Yxb/HfPHLP475Y9Z/HfOH7P475I/ZvHfNX/M4r9b/pjFf/f8MYv/HvljFv8988cs/nvlj1n8P5I/ZvHfO3/M4r9P/pjFf9/8MYv/R/PHLP775Y9Z/D+WP2bx3z9/zOJ/QP6Yxf/A/DGL/0H5Yxb/g/PHLP6H5I9Z/A/NH7P4H5Y/ZvE/PH/M4n9E/pjF/+P5Yxb/I/PHLP5H5Y9Z/I/OH7P4H5M/ZvE/Nn/M4n9c/pjF/xP5Yxb/4/PHLP4n5I9Z/D+ZP2bx/1T+mMX/xPwxi/+n88cs/iflj1n8T84fs/ifkj9m8T81f8zif1r+mMX/M/ljFv/T88cs/mfkj1n8P5s/ZvH/XP6Yxf/M/DGL/1n5Yxb/z+ePWfzPzh+z+H8hf8zif07+mMX/3Pwxi/95+WMW/y/mj1n8z88fs/hfkD9m8b8wf8zif1H+mMX/S/ljFv+L88cs/pfkj1n8L80fs/hflj9m8f9y/pjF//L8MYv/V/LHLP5fzR+z+F+RP2bx/1r+mMX/yvwxi//X88cs/lflj1n8r84fs/h/I3/M4v/N/DGL/zX5Yxb/a/PHLP7X5Y9Z/L+VP2bxvz5/zOL/7fwxi/8N+WMW/xvzxyz+N+WPWfxvzh+z+N+SP2bx/07+mMX/u/ljFv/v5Y9Z/L+fP2bx/0H+mMX/h/ljFv8f5Y9Z/G/NH7P4/zh/zOL/k/wxi/9t+WMW/5/mj1n8b88fs/jfkT9m8f9Z/pjF/878MYv/XfljFv+f549Z/H+RP2bxvzt/zOJ/T/6Yxf/e/DGL/y/zxyz+9+WPWfx/lT9m8b8/f8zi/+v8MYv/A/ljFv8H88cs/g/lj1n8H84fs/g/kj9m8X80f8zi/5v8MYv/Y/ljFv/H88cs/r/NH7P4/y5/zOL/+/wxi/8f8scs/n/MH7P4/yl/zOL/RP6Yxf/J/DGL/1P5Yxb/P+ePWfyfzh+z+D+TP2bxfzZ/zOL/l/wxi/9f88cs/n/LH7P4P5c/ZvH/e/6Yxf/5/DGL/wv5Yxb/F/PHLP4v5Y9Z/F/OH7P4v5I/ZvEfmT8m8X/1bv6vz+I/JH/M4j80f8ziPyx/zOI/Xv6YxX94/pjFf/z8MYv/BPljFv8R+WMW/wnzxyz+E+WPWfwnzh+z+E+SP2bxnzR/zOI/Wf6YxX/y/DGL/xT5Yxb/KfPHLP5T5Y9Z/N+WP2bxnzp/zOL/9vwxi/878scs/u/MH7P4T5M/ZvF/V/6YxX/a/DGL/7vzxyz+78kfs/hPlz9m8X9v/pjFf/r8MYv/DPljFv8Z88cs/jPlj1n8Z84fs/jPkj9m8X9f/pjFf9b8MYv/bPljFv/Z88cs/u/PH7P4z5E/ZvGfM3/M4v+B/DGL/1z5Yxb/ufPHLP7z5I9Z/OfNH7P4z5c/ZvGfP3/M4r9A/pjFf8H8MYv/B/PHLP4fyh+z+C+UP2bxXzh/zOK/SP6YxX/R/DGL/2L5Yxb/xfPHLP5L5I9Z/JfMH7P4L5U/ZvFfOn/M4r9M/pjFf9n8MYv/cvljFv/l88cs/ivkj1n8V8wfs/ivlD9m8V85f8ziv0r+mMV/1fwxi/9q+WMW/9Xzxyz+a+SPWfzXzB+z+K+VP2bxXzt/zOK/Tv6YxX/d/DGL/3r5Yxb/9fPHLP4b5I9Z/DfMH7P4b5Q/ZvHfOH/M4r9J/pjFf9P8MYv/ZvljFv/N88cs/lvkj1n8t8wfs/hvlT9m8d86f8ziv03+mMX/w/ljFv9t88cs/tvlj1n8t88fs/jvkD9m8d8xf8ziv1P+mMV/5/wxi/8u+WMW/13zxyz+u+WPWfx3zx+z+O+RP2bx3zN/zOK/V/6Yxf8j+WMW/73zxyz+++SPWfz3zR+z+H80f8ziv1/+mMX/Y/ljFv/988cs/gfkj1n8D8wfs/gflD9m8T84f8zif0j+mMX/0Pwxi/9h+WMW/8Pzxyz+R+SPWfw/nj9m8T8yf8zif1T+mMX/6Pwxi/8x+WMW/2Pzxyz+x+WPWfw/kT9m8T8+f8zif0L+mMX/k/ljFv9P5Y9Z/E/MH7P4fzp/zOJ/Uv6Yxf/k/DGL/yn5Yxb/U/PHLP6n5Y9Z/D+TP2bxPz1/zOJ/Rv6Yxf+z+WMW/8/lj1n8z8wfs/iflT9m8f98/pjF/+z8MYv/F/LHLP7n5I9Z/M/NH7P4n5c/ZvH/Yv6Yxf/8/DGL/wX5Yxb/C/PHLP4X5Y9Z/L+UP2bxvzh/zOJ/Sf6Yxf/S/DGL/2X5Yxb/L+ePWfwvzx+z+H8lf8zi/9X8MYv/FfljFv+v5Y9Z/K/MH7P4fz1/zOJ/Vf6Yxf/q/DGL/zfyxyz+38wfs/hfkz9m8b82f8zif13+mMX/W/ljFv/r88cs/t/OH7P435A/ZvG/MX/M4n9T/pjF/+b8MYv/LfljFv/v5I9Z/L+bP2bx/17+mMX/+/ljFv8f5I9Z/H+YP2bx/1H+mMX/1vwxi/+P88cs/j/JH7P435Y/ZvH/af6Yxf/2/DGL/x35Yxb/n+WPWfzvzB+z+N+VP2bx/3n+mMX/F/ljFv+788cs/vfkj1n8780fs/j/Mn/M4n9f/pjF/1f5Yxb/+/PHLP6/zh+z+D+QP2bxfzB/zOL/UP6Yxf/h/DGL/yP5Yxb/R/PHLP6/yR+z+D+WP2bxfzx/zOL/2/wxi//v8scs/r/PH7P4/yF/zOL/x/wxi/+f8scs/k/kj1n8n8wfs/g/lT9m8f9z/pjF/+n8MYv/M/ljFv9n88cs/n/JH7P4/zV/zOL/t/wxi/9z+WMW/7/nj1n8n88fs/i/kD9m8X8xf8zi/1L+mMX/5fwxi/8r+WMW/5H5YxL/YQP5Yxb/IfljFv+h+WMW/2H5Yxb/8fLHLP7D88cs/uPnj1n8J8gfs/iPyB+z+E+YP2bxnyh/zOI/cf6YxX+S/DGL/6T5Yxb/yfLHLP6T549Z/KfIH7P4T5k/ZvGfKn/M4v+2/DGL/9T5Yxb/t+ePWfzfkT9m8X9n/pjFf5r8MYv/u/LHLP7T5o9Z/N+dP2bxf0/+mMV/uvwxi/9788cs/tPnj1n8Z8gfs/jPmD9m8Z8pf8ziP3P+mMV/lvwxi//78scs/rPmj1n8Z8sfs/jPnj9m8X9//pjFf478MYv/nPljFv8P5I9Z/OfKH7P4z50/ZvGfJ3/M4j9v/pjFf778MYv//PljFv8F8scs/gvmj1n8P5g/ZvH/UP6YxX+h/DGL/8L5Yxb/RfLHLP6L5o9Z/BfLH7P4L54/ZvFfIn/M4r9k/pjFf6n8MYv/0vljFv9l8scs/svmj1n8l8sfs/gvnz9m8V8hf8ziv2L+mMV/pfwxi//K+WMW/1Xyxyz+q+aPWfxXyx+z+K+eP2bxXyN/zOK/Zv6YxX+t/DGL/9r5Yxb/dfLHLP7r5o9Z/NfLH7P4r58/ZvHfIH/M4r9h/pjFf6P8MYv/xvljFv9N8scs/pvmj1n8N8sfs/hvnj9m8d8if8ziv2X+mMV/q/wxi//W+WMW/23yxyz+H84fs/hvmz9m8d8uf8ziv33+mMV/h/wxi/+O+WMW/53yxyz+O+ePWfx3yR+z+O+aP2bx3y1/zOK/e/6YxX+P/DGL/575Yxb/vfLHLP4fyR+z+O+dP2bx3yd/zOK/b/6Yxf+j+WMW//3yxyz+H8sfs/jvnz9m8T8gf8zif2D+mMX/oPwxi//B+WMW/0Pyxyz+h+aPWfwPyx+z+B+eP2bxPyJ/zOL/8fwxi/+R+WMW/6Pyxyz+R+ePWfyPyR+z+B+bP2bxPy5/zOL/ifwxi//x+WMW/xPyxyz+n8wfs/h/Kn/M4n9i/pjF/9P5Yxb/k/LHLP4n549Z/E/JH7P4n5o/ZvE/LX/M4v+Z/DGL/+n5Yxb/M/LHLP6fzR+z+H8uf8zif2b+mMX/rPwxi//n88cs/mfnj1n8v5A/ZvE/J3/M4n9u/pjF/7z8MYv/F/PHLP7n549Z/C/IH7P4X5g/ZvG/KH/M4v+l/DGL/8X5Yxb/S/LHLP6X5o9Z/C/LH7P4fzl/zOJ/ef6Yxf8r+WMW/6/mj1n8r8gfs/h/LX/M4n9l/pjF/+v5Yxb/q/LHLP5X549Z/L+RP2bx/2b+mMX/mvwxi/+1+WMW/+vyxyz+38ofs/hfnz9m8f92/pjF/4b8MYv/jfljFv+b8scs/jfnj1n8b8kfs/h/J3/M4v/d/DGL//fyxyz+388fs/j/IH/M4v/D/DGL/4/yxyz+t+aPWfx/nD9m8f9J/pjF/7b8MYv/T/PHLP63549Z/O/IH7P4/yx/zOJ/Z/6Yxf+u/DGL/8/zxyz+v8gfs/jfnT9m8b8nf8zif2/+mMX/l/ljFv/78scs/r/KH7P4358/ZvH/df6Yxf+B/DGL/4P5Yxb/h/LHLP4P549Z/B/JH7P4P5o/ZvH/Tf6Yxf+x/DGL/+P5Yxb/3+aPWfx/lz9m8f99/pjF/w/5Yxb/P+aPWfz/lD9m8X8if8zi/2T+mMX/qfwxi/+f88cs/k/nj1n8n8kfs/g/mz9m8f9L/pjF/6/5Yxb/v+WPWfyfyx+z+P89f8zi/3z+mMX/hfwxi/+L+WMW/5fyxyz+L+ePWfxfyR+z+I/MH5P4jzeQP2bxH5I/ZvEfmj9m8R+WP2bxHy9/zOI/PH/M4j9+/pjFf4L8MYv/iPwxi/+E+WMW/4nyxyz+E+ePWfwnyR+z+E+aP2bxnyx/zOI/ef6YxX+K/DGL/5T5Yxb/qfLHLP5vyx+z+E+dP2bxf3v+mMX/HfljFv935o9Z/KfJH7P4vyt/zOI/bf6Yxf/d+WMW//fkj1n8p8sfs/i/N3/M4j99/pjFf4b8MYv/jPljFv+Z8scs/jPnj1n8Z8kfs/i/L3/M4j9r/pjFf7b8MYv/7PljFv/3549Z/OfIH7P4z5k/ZvH/QP6YxX+u/DGL/9z5Yxb/efLHLP7z5o9Z/OfLH7P4z58/ZvFfIH/M4r9g/pjF/4P5Yxb/D+WPWfwXyh+z+C+cP2bxXyR/zOK/aP6YxX+x/DGL/+L5Yxb/JfLHLP5L5o9Z/JfKH7P4L50/ZvFfJn/M4r9s/pjFf7n8MYv/8vljFv8V8scs/ivmj1n8V8ofs/ivnD9m8V8lf8ziv2r+mMV/tfwxi//q+WMW/zXyxyz+a+aPWfzXyh+z+K+dP2bxXyd/zOK/bv6YxX+9/DGL//r5Yxb/DfLHLP4b5o9Z/DfKH7P4b5w/ZvHfJH/M4r9p/pjFf7P8MYv/5vljFv8t8scs/lvmj1n8t8ofs/hvnT9m8d8mf8zi/+H8MYv/tvljFv/t8scs/tvnj1n8d8gfs/jvmD9m8d8pf8ziv3P+mMV/l/wxi/+u+WMW/93yxyz+u+ePWfz3yB+z+O+ZP2bx3yt/zOL/kfwxi//e+WMW/33yxyz+++aPWfw/mj9m8d8vf8zi/7H8MYv//vljFv8D8scs/gfmj1n8D8ofs/gfnD9m8T8kf8zif2j+mMX/sPwxi//h+WMW/yPyxyz+H88fs/gfmT9m8T8qf8zif3T+mMX/mPwxi/+x+WMW/+Pyxyz+n8gfs/gfnz9m8T8hf8zi/8n8MYv/p/LHLP4n5o9Z/D+dP2bxPyl/zOJ/cv6Yxf+U/DGL/6n5Yxb/0/LHLP6fyR+z+J+eP2bxPyN/zOL/2fwxi//n8scs/mfmj1n8z8ofs/h/Pn/M4n92/pjF/wv5Yxb/c/LHLP7n5o9Z/M/LH7P4fzF/zOJ/fv6Yxf+C/DGL/4X5Yxb/i/LHLP5fyh+z+F+cP2bxvyR/zOJ/af6Yxf+y/DGL/5fzxyz+l+ePWfy/kj9m8f9q/pjF/4r8MYv/1/LHLP5X5o9Z/L+eP2bxvyp/zOJ/df6Yxf8b+WMW/2/mj1n8r8kfs/hfmz9m8b8uf8zi/638MYv/9fljFv9v549Z/G/IH7P435g/ZvG/KX/M4n9z/pjF/5b8MYv/d/LHLP7fzR+z+H8vf8zi//38MYv/D/LHLP4/zB+z+P8of8zif2v+mMX/x+P6H/X/eFz/S7P4/6TjH7P435Y/ZvH/af6Yxf/2/DGL/x35Yxb/n+WPWfzvzB+z+N+VP2bx/3n+mMX/F/ljFv+788cs/vfkj1n8780fs/j/Mn/M4n9f/pjF/1f5Yxb/+/PHLP6/zh+z+D+QP2bxfzB/zOL/UP6Yxf/h/DGL/yP5Yxb/R/PHLP6/yR+z+D+WP2bxfzx/zOL/2/wxi//v8scs/r/PH7P4/yF/zOL/x/wxi/+f8scs/k/kj1n8n8wfs/g/lT9m8f9z/pjF/+n8MYv/M/ljFv9n88cs/n/JH7P4/zV/zOL/t/wxi/9z+WMW/7/nj1n8n88fs/i/kD9m8X8xf8zi/1L+mMX/5fwxi/8r+WMW/5H5YxL/4QP5Yxb/IfljFv+h+WMW/2H5Yxb/8fLHLP7D88cs/uPnj1n8J8gfs/iPyB+z+E+YP2bxnyh/zOI/cf6YxX+S/DGL/6T5Yxb/yfLHLP6T549Z/KfIH7P4T5k/ZvGfKn/M4v+2/DGL/9T5Yxb/t+ePWfzfkT9m8X9n/pjFf5r8MYv/u/LHLP7T5o9Z/N+dP2bxf0/+mMV/uvwxi/9788cs/tPnj1n8Z8gfs/jPmD9m8Z8pf8ziP3P+mMV/lvwxi//78scs/rPmj1n8Z8sfs/jPnj9m8X9//pjFf478MYv/nPljFv8P5I9Z/OfKH7P4z50/ZvGfJ3/M4j9v/pjFf778MYv//PljFv8F8scs/gvmj1n8P5g/ZvH/UP6YxX+h/DGL/8L5Yxb/RfLHLP6L5o9Z/BfLH7P4L54/ZvFfIn/M4r9k/pjFf6n8MYv/0vljFv9l8scs/svmj1n8l8sfs/gvnz9m8V8hf8ziv2L+mMV/pfwxi//K+WMW/1Xyxyz+q+aPWfxXyx+z+K+eP2bxXyN/zOK/Zv6YxX+t/DGL/9r5Yxb/dfLHLP7r5o9Z/NfLH7P4r58/ZvHfIH/M4r9h/pjFf6P8MYv/xvljFv9N8scs/pvmj1n8N8sfs/hvnj9m8d8if8ziv2X+mMV/q/wxi//W+WMW/23yxyz+H84fs/hvmz9m8d8uf8ziv33+mMV/h/wxi/+O+WMW/53yxyz+O+ePWfx3yR+z+O+aP2bx3y1/zOK/e/6YxX+P/DGL/575Yxb/vfLHLP4fyR+z+O+dP2bx3yd/zOK/b/6Yxf+j+WMW//3yxyz+H8sfs/jvnz9m8T8gf8zif2D+mMX/oPwxi//B+WMW/0Pyxyz+h+aPWfwPyx+z+B+eP2bxPyJ/zOL/8fwxi/+R+WMW/6Pyxyz+R+ePWfyPyR+z+B+bP2bxPy5/zOL/ifwxi//x+WMW/xPyxyz+n8wfs/h/Kn/M4n9i/pjF/9P5Yxb/k/LHLP4n549Z/E/JH7P4n5o/ZvE/LX/M4v+Z/DGL/+n5Yxb/M/LHLP6fzR+z+H8uf8zif2b+mMX/rPwxi//n88cs/mfnj1n8v5A/ZvE/J3/M4n9u/pjF/7z8MYv/F/PHLP7n549Z/C/IH7P4X5g/ZvG/KH/M4v+l/DGL/8X5Yxb/S/LHLP6X5o9Z/C/LH7P4fzl/zOJ/ef6Yxf8r+WMW/6/mj1n8r8gfs/h/LX/M4n9l/pjF/+v5Yxb/q+T+Rw/n5Rb/q+X+b5TF/xv5Yxb/b+aPWfyvyR+z+F+bP2bxvy5/zOL/rfwxi//1+WMW/2/nj1n8b8gfs/jfmD9m8b8pf8zif3P+mMX/lvwxi/938scs/t/NH7P4fy9/zOL//fwxi/8P8scs/j/MH7P4/yh/zOJ/a/6Yxf/H+WMW/5/kj1n8b8sfs/j/NH/M4n97/pjF/478MYv/z/LHLP535o9Z/O/KH7P4/zx/zOL/i/wxi//d+WMW/3vyxyz+9+aPWfx/mT9m8b8vf8zi/6v8MYv//fljFv9f549Z/B/IH7P4P5g/ZvF/KH/M4v9w/pjF/5H8MYv/o/ljFv/f5I9Z/B/LH7P4P54/ZvH/bf6Yxf93+WMW/9/nj1n8/5A/ZvH/Y/6Yxf9P+WMW/yfyxyz+T+aPWfyfyh+z+P85f8zi/3T+mMX/mfwxi/+z+WMW/7/kj1n8/5o/ZvH/W/6Yxf+5/DGL/9/zxyz+z+ePWfxfyB+z+L+YP2bxfyl/zOL/cv6Yxf+V/DGL/8j8MYn/+AP5Yxb/IfljFv+h+WMW/2H5Yxb/8fLHLP7D88cs/uPnj1n8J8gfs/iPyB+z+E+YP2bxnyh/zOI/cf6YxX+S/DGL/6T5Yxb/yfLHLP6T549Z/KfIH7P4T5k/ZvGfKn/M4v+2/DGL/9T5v67pRf5vzx+z+L8jf8zi/878MYv/NPljFv935Y9Z/KfNH7P4vzt/zOL/nvwxi/90+WMW//fmj1n8p88fs/jPkD9m8Z8xf8ziP1P+mMV/5vwxi/8s+WMW//flj1n8Z80fs/jPlj9m8Z89f8zi//78MYv/HPljFv8588cs/h/IH7P4z5U/ZvGfO3/M4j9P/pjFf978MYv/fPljFv/588cs/gvkj1n8F8wfs/h/MH/M4v+h/DGL/0L5Yxb/hfPHLP6L5I9Z/BfNH7P4L5Y/ZvFfPH/M4r9E/pjFf8n8MYv/UvljFv+l88cs/svkj1n8l80fs/gvlz9m8V8+f8ziv0L+mMV/xfwxi/9K+WMW/5Xzxyz+q+SPWfxXzR+z+K+WP2bxXz1/zOK/Rv6YxX/N/DGL/1r5Yxb/tfPHLP7r5I9Z/NfNH7P4r5c/ZvFfP3/M4r9B/pjFf8P8MYv/RvljFv+N88cs/pvkj1n8N80fs/hvlj9m8d88f8ziv0X+mMV/y/wxi/9W+WMW/63zxyz+2+SPWfw/nD9m8d82f8ziv13+mMV/+/wxi/8O+WMW/x3zxyz+O+WPWfx3zh+z+O+SP2bx3zV/zOK/W/6YxX/3/DGL/x75Yxb/PfPHLP575Y9Z/D+SP2bx3zt/zOK/T/6YxX/f/DGL/0fzxyz+++WPWfw/lj9m8d8/f8zif0D+mMX/wPwxi/9B+WMW/4Pzxyz+h+SPWfwPzR+z+B+WP2bxPzx/zOJ/RP6Yxf/j+WMW/yPzxyz+R+WPWfyPzh+z+B+TP2bxPzZ/zOJ/XP6Yxf8T+WMW/+Pzxyz+J+SPWfw/mT9m8f9U/pjF/8T8MYv/p/PHLP4n5Y9Z/E/OH7P4n5I/ZvE/NX/M4n9a/pjF/zP5Yxb/0/PHLP5n5I9Z/D+bP2bx/1z+mMX/zPwxi/9Z+WMW/8/nj1n8z84fs/h/IX/M4n9O/pjF/9z8MYv/efljFv8v5o9Z/M/PH7P4X5A/ZvG/MH/M4n9R/pjF/0v5Yxb/i/PHLP6X5I9Z/C/NH7P4X5Y/ZvH/cv6Yxf/y/DGL/1fyxyz+X80fs/hfkT9m8f9a/pjF/8r8MYv/1/PHLP5X5Y9Z/K/OH7P4fyN/zOL/zfwxi/81+WMW/2vzx/4j/QdfxNj+1+WP/Uf6D94d2/9b+WMW/+vzxyz+384fs/jfkD9m8b8xf8zif1P+mMX/5vwxi/8t+WMW/+/kj1n8v5s/ZvH/Xv6Yxf/7+WMW/x/kj1n8f5g/ZvH/Uf6Yxf/W/DGL/4/zxyz+P8kfs/jflj9m8f9p/pjF//b8MYv/HfljFv+f5Y9Z/O/MH7P435U/ZvH/ef6Yxf8X+WMW/7vzxyz+9+SPWfzvzR+z+P8yf8zif1/+mMX/V/ljFv/788cs/r/OH7P4P5A/ZvF/MH/M4v9Q/pjF/+H8MYv/I/ljFv9H88cs/r/JH7P4P5Y/ZvF/PH/M4v/b/DGL/+/yxyz+v88fs/j/IX/M4v/H/DGL/5/yxyz+T+SPWfyfzB+z+D+VP2bx/3P+mMX/6fwxi/8z+WMW/2fzxyz+f8kfs/j/NX/M4v+3/DGL/3P5Yxb/v+ePWfyfzx+z+L+QP2bxfzF/zOL/Uv6Yxf/l/DGL/yv5Yxb/kfljEv8JBvLHLP5D8scs/kPzxyz+w/LHLP7j5Y9Z/Ifnj1n8x88fs/hPkD9m8R+RP2bxnzB/zOI/Uf6YxX/i/DGL/yT5Yxb/SfPHLP6T5Y9Z/CfPH7P4T5E/ZvGfMn/M4j9V/pjF/235Yxb/qfPHLP5vzx+z+L8jf8zi/878MYv/NPljFv935Y9Z/KfNH7P4vzt/zOL/nvwxi/90+WMW//fmj1n8p88fs/jPkD9m8Z8xf8ziP1P+mMV/5vwxi/8s+WMW//flj1n8Z80fs/jPlj9m8Z89f8zi//78MYv/HPljFv8588cs/h/IH7P4z5U/ZvGfO3/M4j9P/pjFf978MYv/fPljFv/588cs/gvkj1n8F8wfs/h/MH/M4v+h/DGL/0L5Yxb/hfPHLP6L5I9Z/BfNH7P4L5Y/ZvFfPH/M4r9E/pjFf8n8MYv/UvljFv+l88cs/svkj1n8l80fs/gvlz9m8V8+f8ziv0L+mMV/xfwxi/9K+WMW/5Xzxyz+q+SPWfxXzR+z+K+WP2bxXz1/zOK/Rv6YxX/N/DGL/1r5Yxb/tfPHLP7r5I9Z/NfNH7P4r5c/ZvFfP3/M4r9B/pjFf8P8MYv/RvljFv+N88cs/pvkj1n8N80fs/hvlj9m8d88f8ziv0X+mMV/y/wxi/9W+WMW/63zxyz+2+SPWfw/nD9m8d82f8ziv13+mMV/+/wxi/8O+WMW/x3zxyz+O+WPWfx3zh+z+O+SP2bx3zV/zOK/W/6YxX/3/DGL/x75Yxb/PfPHLP575Y9Z/D+SP2bx3zt/zOK/T/6YxX/f/DGL/0fzxyz+++WPWfw/lj9m8d8/f8zif0D+mMX/wPwxi/9B+WMW/4Pzxyz+h+SPWfwPzR+z+B+WP2bxPzx/zOJ/RP6Yxf/j+WMW/yPzxyz+R+WPWfyPzh+z+B+TP2bxPzZ/zOJ/XP6Yxf8T+WMW/+Pzxyz+J+SPWfw/mT9m8f9U/pjF/8T8MYv/p/PHLP4n5Y9Z/E/OH7P4n5I/ZvE/NX/M4n9a/pjF/zP5Yxb/0/PHLP5n5I9Z/D+bP2bx/1z+mMX/zPwxi/9Z+WMW/8/nj1n8z84fs/h/IX/M4n9O/pjF/9z8MYv/efljFv8v5o9Z/M/PH7P4X5A/ZvG/MH/M4n9R/pjF/0v5Yxb/i/PHLP6X5I9Z/C/NH7P4X5Y/ZvH/cv6Yxf/y/DGL/1fyxyz+X80fs/hfkT9m8f9a/pjF/8r8MYv/1/PHLP5X5Y9Z/K/OH7P4fyN/zOL/zfwxi/81+WMW/2vzxyz+1+WPWfy/lT9m8b8+f8zi/+38MYv/DfljFv8b88cs/jflj1n8b84fs/jfkj9m8f9O/pjF/7v5Yxb/7+WPWfy/nz9m8f9B/pjF/4f5Yxb/H+WPWfxvzR+z+P84f8zi/5P8MYv/bfljFv+f5o9Z/G/PH7P435E/ZvH/Wf6Yxf/O/DGL/135Yxb/n+ePWfx/kT9m8b87f8zif0/+mMX/3vwxi/8v88cs/vflj1n8f5U/ZvG/P3/M4v/r/DGL/wP5Yxb/B/PHLP4Pveq/1Fs1qv+1Wfwf7vjHLP6P5I9Z/B/NH7P4/yZ/zOL/WP6Yxf/x/DGL/2/zxyz+v8sfs/j/Pn/M4v+H/DGL/x/zxyz+f8ofs/g/kT9m8X8yf8zi/1T+mMX/z/ljFv+n88cs/s/kj1n8n80fs/j/JX/M4v/X/DGL/9/yxyz+z+WPWfz/nj9m8X8+f8zi/0L+mMX/xfwxi/9L+WMW/5fzxyz+r+SPWfxH5o9J/EcM5I9Z/Ifkj1n8h+aPWfyH5Y9Z/MfLH7P4D88fs/iPnz9m8Z8gf8ziPyJ/zOI/Yf6YxX+i/DGL/8T5Yxb/SfLHLP6T5o9Z/CfLH7P4T54/ZvGfIn/M4j9l/pjFf6r8MYv/2/LHLP5T549Z/N+eP2bxf0f+mMX/nfljFv9p8scs/u/KH7P4T5s/ZvF/d/6Yxf89+WMW/+nyxyz+780fs/hPnz9m8Z8hf8ziP2P+mMV/pvwxi//M+WMW/1nyxyz+78sfs/jPmj9m8Z8tf8ziP3v+mMX//fljFv858scs/nPmj1n8P5A/ZvGfK3/M4j93/pjFf578MYv/vPljFv/58scs/vPnj1n8F8gfs/gvmD9m8f9g/pjF/0P5Yxb/hfLHLP4L549Z/BfJH7P4L5o/ZvFfLH/M4r94/pjFf4n8MYv/kvljFv+l8scs/kvnj1n8l8kfs/gvmz9m8V8uf8ziv3z+mMV/hfwxi/+K+WMW/5Xyxyz+K+ePWfxXyR+z+K+aP2bxXy1/zOK/ev6YxX+N/DGL/5r5Yxb/tfLHLP5r549Z/NfJH7P4r5s/ZvFfL3/M4r9+/pjFf4P8MYv/hvljFv+N8scs/hvnj1n8N8kfs/hvmj9m8d8sf8ziv3n+mMV/i/wxi/+W+WMW/63yxyz+W+ePWfy3yR+z+H84f8ziv23+mMV/u/wxi//2+WMW/x3yxyz+O+aPWfx3yh+z+O+cP2bx3yV/zOK/a/6YxX+3/DGL/+75Yxb/PfLHLP575o9Z/PfKH7P4fyR/zOK/d/6YxX+f/DGL/775Yxb/j+aPWfz3yx+z+H8sf8ziv3/+mMX/gPwxi/+B+WMW/4Pyxyz+B+ePWfwPyR+z+B+aP2bxPyx/zOJ/eP6Yxf+I/DGL/8fzxyz+R+aPWfyPyh+z+B+dP2bxPyZ/zOJ/bP6Yxf+4/DGL/yfyxyz+x+ePWfxPyB+z+H8yf8zi/6n8MYv/ifljFv9P549Z/E/KH7P4n5w/ZvE/JX/M4n9q/pjF/7T8MYv/Z/LHLP6n549Z/M/IH7P4fzZ/zOL/ufwxi/+Z+WMW/7Pyxyz+n88fs/ifnT9m8f9C/pjF/5z8MYv/ufljFv/z8scs/l/MH7P4n58/ZvG/IH/M4n9h/pjF/6L8MYv/l/LHLP4X549Z/C/JH7P4X5o/ZvG/LH/M4v/l/DGL/+X5Yxb/r+SPWfy/mj9m8b8if8zi/7X8MYv/lfljFv+v549Z/K/KH7P4X50/ZvH/Rv6Yxf+b+WMW/2vyxyz+1+aPWfyvyx+z+H8rf8zif33+mMX/2/ljFv8b8scs/jfmj1n8b8ofs/jfnD9m8b8lf8zi/538MYv/d/PHLP7fyx+z+H8/f8zi/4P8MYv/D/PHLP4/yh+z+N+aP2bx/3H+mMX/J/ljFv/b8scs/j/NH7P4354/ZvG/I3/M4v+z/DGL/535Yxb/u/LHLP4/zx+z+P8if8zif3f+mMX/nvwxi/+9+WMW/1/mj1n878sfs/j/Kn/M4n9//pjF/9f5Yxb/B/LHLP4P5o9Z/B/KH7P4P5w/ZvF/JH/M4v9o/pjF/zf5Yxb/x/LHLP6P549Z/H+bP2bx/13+mMX/9/ljFv8/5I9Z/P+YP2bx/1P+mMX/ifwxi/+T+WMW/6fyxyz+f84fs/g/nT9m8X8mf8zi/2z+mMX/L/ljFv+/5o9Z/P+WP2bxfy5/zOL/9/wxi//z+WMW/xfyxyz+L+aPWfxfyh+z+L+cP2bxfyV/zOI/Mn9M4j/hQP6YxX9I/pjFf2j+mMV/WP6YxX+8/DGL//D8MYv/+PljFv8J8scs/iPyxyz+E+aPWfwnyh+z+E+cP2bxnyR/zOI/af6YxX+y/DGL/+T5Yxb/KfLHLP5T5o9Z/KfKH7P4vy1/zOI/df6Yxf/t+WMW/3fkj1n835k/ZvGfJn/M4v+u/DGL/7T5Yxb/d+ePWfzfkz9m8Z8uf8zi/978MYv/9PljFv8Z8scs/jPmj1n8Z8ofs/jPnD9m8Z8lf8zi/778MYv/rPljFv/Z8scs/rPnj1n8358/ZvGfI3/M4j9n/pjF/wP5Yxb/ufLHLP5z549Z/OfJH7P4z5s/ZvGfL3/M4j9//pjFf4H8MYv/gvljFv8P5o9Z/D+UP2bxXyh/zOK/cP6YxX+R/DGL/6L5Yxb/xfLHLP6L549Z/JfIH7P4L5k/ZvFfKn/M4r90/pjFf5n8MYv/svljFv/l8scs/svnj1n8V8gfs/ivmD9m8V8pf8ziv3L+mMV/lfwxi/+q+WMW/9Xyxyz+q+ePWfzXyB+z+K+ZP2bxXyt/zOK/dv6YxX+d/DGL/7r5Yxb/9fLHLP7r549Z/DfIH7P4b5g/ZvHfKH/M4r9x/pjFf5P8MYv/pvljFv/N8scs/pvnj1n8t8gfs/hvmT9m8d8qf8ziv3X+mMV/m/wxi/+H88cs/tvmj1n8t8sfs/hvnz9m8d8hf8ziv2P+mMV/p/wxi//O+WMW/13yxyz+u+aPWfx3yx+z+O+eP2bx3yN/zOK/Z/6YxX+v/DGL/0fyxyz+e+ePWfz3yR+z+O+bP2bx/2j+mMV/v/wxi//H8scs/vvnj1n8D8gfs/gfmD9m8T8of8zif3D+mMX/kPwxi/+h+WMW/8Pyxyz+h+ePWfyPyB+z+H88f8zif2T+mMX/qPwxi//R+WMW/2Pyxyz+x+aPWfyPyx+z+H8if8zif3z+mMX/hPwxi/8n88cs/p/KH7P4n5g/ZvH/dP6Yxf+k/DGL/8n5Yxb/U/LHLP6n5o9Z/E/LH7P4fyZ/zOJ/ev6Yxf+M/DGL/2fzxyz+n8sfs/ifmT9m8T8rf8zi//n8MYv/2fljFv8v5I9Z/M/JH7P4n5s/ZvE/L3/M4v/F/DGL//n5Yxb/C/LHLP4X5o9Z/C/KH7P4fyl/zOJ/cf6Yxf+S/DGL/6X5Yxb/y/LHLP5fzh+z+F+eP2bx/0r+mMX/q/ljFv8r8scs/l/LH7P4X5k/ZvH/ev6Yxf+q/DGL/9X5Yxb/b+SPWfy/mT9m8b8mf8zif23+mMX/Oqn/yP/i+xb/b0n9/6ss/tfnj1n8v50/ZvG/IX/M4n9j/pjF/6b8MYv/zfljFv9b8scs/t/JH7P4fzd/zOL/vfwxi//388cs/j/IH7P4/zB/zOL/o/wxi/+t+WMW/x/nj1n8f5I/ZvG/LX/M4v/T/DGL/+35Yxb/O/LHLP4/yx+z+N+ZP2bxvyt/zOL/8/wxi/8v8scs/nfnj1n878kfs/jfmz9m8f9l/pjF/778MYv/r/LHLP73549Z/H+dP2bxfyB/zOL/YP6Yxf+h/DGL/8P5Yxb/R/LHLP6P5o9Z/H+TP2bxfyx/zOL/eP6Yxf+3+WMW/9/lj1n8f58/ZvH/Q/6Yxf+P+WMW/z/lj1n8n8gfs/g/mT9m8X8qf8zi/+f8MYv/0/ljFv9n8scs/s/mj1n8/5I/ZvH/a/6Yxf9v+WMW/+fyxyz+f88fs/g/nz9m8X8hf8zi/2L+mMX/pfwxi//L+WMW/1fyxyz+I/PHJP4TDeSPWfyH5I9Z/Ifmj1n8h+WPWfzHyx+z+A/PH7P4j58/ZvGfIH/M4j8if8ziP2H+mMV/ovwxi//E+WMW/0nyxyz+k+aPWfwnyx+z+E+eP2bxnyJ/zOI/Zf6YxX+q/DGL/9vyxyz+U+ePWfzfnj9m8X9H/pjF/535Yxb/afLHLP7vyh+z+E+bP2bxf3f+mMX/PfljFv/p8scs/u/NH7P4T58/ZvGfIX/M4j9j/pjFf6b8MYv/zPljFv9Z8scs/u/LH7P4z5o/ZvGfLX/M4j97/pjF//35Yxb/OfLHLP5z5o9Z/D+QP2bxnyt/zOI/d/6YxX+e/DGL/7z5Yxb/+fLHLP7z549Z/BfIH7P4L5g/ZvH/YP6Yxf9D+WMW/4Xyxyz+C+ePWfwXyR+z+C+aP2bxXyx/zOK/eP6YxX+J/DGL/5L5Yxb/pfLHLP5L549Z/JfJH7P4L5s/ZvFfLn/M4r98/pjFf4X8MYv/ivljFv+V8scs/ivnj1n8V8kfs/ivmj9m8V8tf8ziv3r+mMV/jfwxi/+a+WMW/7Xyxyz+a+ePWfzXyR+z+K+bP2bxXy9/zOK/fv6YxX+D/DGL/4b5Yxb/jfLHLP4b549Z/DfJH7P4b5o/ZvHfLH/M4r95/pjFf4v8MYv/lvljFv+t8scs/lvnj1n8t8kfs/h/OH/M4r9t/pjFf7v8MYv/9vljFv8d8scs/jvmj1n8d8ofs/jvnD9m8d8lf8ziv2v+S9NCi/9u+WMW/93zxyz+e+SPWfz3zB+z+O+VP2bx/0j+mMV/7/wxi/8++WMW/33zxyz+H80fs/jvlz9m8f9Y/pjFf//8MYv/AfljFv8D88cs/gflj1n8D84fs/gfkj9m8T80f8zif1j+mMX/8Pwxi/8R+WMW/4/nj1n8j8wfs/gflT9m8T86f8zif0z+mMX/2Pwxi/9x+WMW/0/kj1n8j88fs/ifkD9m8f9k/pjF/1P5Yxb/E/PHLP6fzh+z+J+UP2bxPzl/zOJ/Sv6Yxf/U/DGL/2n5Yxb/z+SPWfxPzx+z+J+RP2bx/2z+mMX/c/ljFv8z88cs/mflj1n8P58/ZvE/O3/M4v+F/DGL/zn5Yxb/c/PHLP7n5Y9Z/L+YP2bxPz9/zOJ/Qf6Yxf/C/DGL/0X5Yxb/L+WPWfwvzh+z+F+SP2bxvzR/zOJ/Wf6Yxf/L+WMW/8vzxyz+X8kfs/h/NX/M4n9F/pjF/2v5Yxb/K/PHLP5fzx+z+F+VP2bxvzp/zOL/jfwxi/8388cs/tfkj1n8r80fs/hflz9m8f9W/pjF//r8MYv/t/PHLP435I9Z/G/MH7P435Q/ZvG/OX/M4n9L/pjF/zv5Yxb/7+aPWfy/lz9m8f9+/pjF/wf5Yxb/H+aPWfx/lD9m8b81f8zi/+P8MYv/T/LHLP635Y9Z/H+aP2bxvz1/zOJ/R/6Yxf9n+WMW/zvzxyz+d+WPWfx/nj9m8f9F/pjF/+78MYv/PfljFv9788cs/r/MH7P435c/ZvH/Vf6Yxf/+/DGL/6/zxyz+D+SPWfwfzB+z+D+UP2bxfzh/zOL/SP6Yxf/R/DGL/2/yxyz+j+WPWfwfzx+z+P82f8zi/7v8MYv/7/PHLP5/yB+z+P8xf8zi/6f8MYv/E/ljFv8n88cs/k/lj1n8/5w/ZvF/On/M4v9M/pjF/9n8MYv/X/LHLP5/zR+z+P8tf8zi/1z+mMX/7/ljFv/n88cs/i/kj1n8X8wfs/i/lD9m8X85f8zi/0r+mMV/ZP6YxH/igfwxi/+Q/DGL/9D8MYv/sPwxi/94+WMW/+H5Yxb/8fPHLP4T5I9Z/Efkj1n8J8wfs/hPlD9m8Z84f8ziP0n+mMV/0vwxi/9k+WMW/8nzxyz+U+SPWfynzB+z+E+VP2bxf1v+mMV/6vwxi//b88cs/u/IH7P4vzN/zOI/Tf6Yxf9d+WMW/2nzxyz+784fs/i/J3/M4j9d/pjF/735Yxb/6fPHLP4z5I9Z/GfMH7P4z5Q/ZvGfOX/M4j9L/pjF/335Yxb/WfPHLP6z5Y9Z/GfPH7P4vz9/zOI/R/6YxX/O/DGL/wfyxyz+c+WPWfznzh+z+M+TP2bxnzd/zOI/X/6YxX/+/DGL/wL5Yxb/BfPHLP4fzB+z+H8of8ziv1D+mMV/4fwxi/8i+WMW/0Xzxyz+i+WPWfwXzx+z+C+RP2bxXzJ/zOK/VP6YxX/p/DGL/zL5Yxb/ZfPHLP7L5Y9Z/JfPH7P4r5A/ZvFfMX/M4r9S/pjFf+X8MYv/KvljFv9V88cs/qvlj1n8V88fs/ivkT9m8V8zf8ziv1b+mMV/7fwxi/86+WMW/3Xzxyz+6+WPWfzXzx+z+G+QP2bx3zB/zOK/Uf6YxX/j/DGL/yb5Yxb/TfPHLP6b5Y9Z/DfPH7P4b5E/ZvHfMn/M4r9V/pjFf+v8MYv/NvljFv8P549Z/LfNH7P4b5c/ZvHfPn/M4r9D/pjFf8f8MYv/TvljFv+d88cs/rvkj1n8d80fs/jvlj9m8d89f8ziv0f+mMV/z/wxi/9e+WMW/4/kj1n8984fs/jvkz9m8d83f8zi/9H8MYv/fvljFv+P5Y9Z/PfPH7P4H5A/ZvE/MH/M4n9Q/pjF/+D8MYv/IfljFv9D88cs/oflj1n8D88fs/gfkT9m8f94/pjF/8j8MYv/UfljFv+j88cs/sfkj1n8j80fs/gflz9m8f9E/pjF//j8MYv/CfljFv9P5o9Z/D+VP2bxPzF/zOL/6fwxi/9J+WMW/5Pzxyz+p+SPWfxPzR+z+J+WP2bx/0z+mMX/9Pwxi/8Z+WMW/8/mj1n8P5c/ZvE/M3/M4n9W/pjF//P5Yxb/s/PHLP5fyB+z+J+TP2bxPzd/zOJ/Xv6Yxf+L+WMW//Pzxyz+F+SPWfwvzB+z+F+UP2bx/1L+mMX/4vwxi/8l+WMW/0vzxyz+l+WPWfy/nD9m8b88f8zi/5X8MYv/V/PHLP5X5I9Z/L+WP2bxvzJ/zOL/9fwxi/9V+WMW/6vzxyz+38gfs/h/M3/M4n9N/pjF/9r8MYv/dfljFv9v5Y9Z/K/PH7P4fzt/zOJ/Q/6Yxf/G/DGL/035Yxb/m/PHLP635I9Z/L+TP2bx/27+mMX/e/ljFv/v549Z/H+QP2bx/2H+mMX/R/ljFv9b88cs/j/OH7P4/yR/zOJ/W/6Yxf+n+WMW/9vzxyz+d+SPWfx/lj9m8b8zf8zif1f+mMX/5/ljFv9f5I9Z/O/OH7P435M/ZvG/N3/M4v/L/DGL/335Yxb/X+WPWfzvzx+z+P86f8zi/0D+mMX/wfwxi/9D+WMW/4fzxyz+j+SPWfwfzR+z+P8mf8zi/1j+mMX/8fwxi/9v88cs/r/LH7P4/z5/zOL/h/wxi/8f88cs/n/KH7P4P5E/ZvF/Mn/M4v9U/pjF/8/5Yxb/p/PHLP7P5I9Z/J/NH7P4/yV/zOL/1/wxi//f8scs/s/lj1n8/54/ZvF/Pn/M4v9C/pjF/8X8MYv/S/ljFv+X88cs/q/kj1n8R+aPSfwnGcgfs/gPyR+z+A/NH7P4D8sfs/iPlz9m8R+eP2bxHz9/zOI/Qf6YxX9E/pjFf8L8MYv/RPljFv+J88cs/pPkj1n8J80fs/hPlj9m8Z88f8ziP0X+mMV/yvwxi/9U+WMW/7flj1n8p84fs/i/PX/M4v+O/DGL/zvzxyz+0+SPWfzflT9m8Z82f8zi/+78MYv/e/LHLP7T5Y9Z/N+bP2bxnz5/zOI/Q/6YxX/G/DGL/0z5Yxb/mfPHLP6z5I9Z/N+XP2bxnzV/zOI/W/6YxX/2/DGL//vzxyz+c+SPWfznzB+z+H8gf8ziP1f+mMV/7vwxi/88+WMW/3nzxyz+8+WPWfznzx+z+C+QP2bxXzB/zOL/wfwxi/+H8scs/gvlj1n8F84fs/gvkj9m8V80f8ziv1j+mMV/8fwxi/8S+WMW/yXzxyz+S+WPWfyXzh+z+C+TP2bxXzZ/zOK/XP6YxX/5/DGL/wr5Yxb/FfPHLP4r5Y9Z/FfOH7P4r5I/ZvFfNX/M4r9a/pjFf/X8MYv/GvljFv8188cs/mvlj1n8184fs/ivkz9m8V83f8ziv17+mMV//fwxi/8G+WMW/w3zxyz+G+WPWfw3zh+z+G+SP2bx3zR/zOK/Wf6YxX/z/DGL/xb5Yxb/LfPHLP5b5Y9Z/LfOH7P4b5M/ZvH/cP6YxX/b/DGL/3b5Yxb/7fPHLP475I9Z/HfMH7P475Q/ZvHfOX/M4r9L/pjFf9f8MYv/bvljFv/d88cs/nvkj1n898wfs/jvlT9m8f9I/pjFf+/8MYv/PvljFv9988cs/h/NH7P475c/ZvH/WP6YxX///DGL/wH5Yxb/A/PHLP4H5Y9Z/A/OH7P4H5I/ZvE/NH/M4n9Y/pjF//D8MYv/EfljFv+P549Z/I/MH7P4H5U/ZvE/On/M4n9M/pjF/9j8MYv/cfljFv9P5I9Z/I/PH7P4n5A/ZvH/ZP6Yxf9T+WMW/xPzxyz+n84fs/iflD9m8T85f8zif0r+mMX/1Pwxi/9p+WMW/8/kj1n8T88fs/ifkT9m8f9s/pjF/3P5Yxb/M/PHLP5n5Y9Z/D+fP2bxPzt/zOL/hfwxi/85+WMW/3Pzxyz+5+WPWfy/mD9m8T8/f8zif0H+mMX/wvwxi/9F+WMW/y/lj1n8L84fs/hfkj9m8b80f8zif1n+mMX/y/ljFv/L88cs/l/JH7P4fzV/zOJ/Rf6Yxf9r+WMW/yvzxyz+X88fs/hflT9m8b86f8zi/438MYv/N/PHLP7X5I9Z/K/NH7P4X5c/ZvH/Vv6Yxf/6/DGL/7fzxyz+N+SPWfxvzB+z+N+UP2bxvzl/zOJ/S/6Yxf87+WMW/+/mj1n8v5c/ZvH/fv6Yxf8H+WMW/x/mj1n8f5Q/ZvG/NX/M4v/j/DGL/0/yxyz+t+WPWfx/mj9m8b89f8zif0f+mMX/Z/ljFv8788cs/nflj1n8f54/ZvH/Rf6Yxf/u/DGL/z35Yxb/e/PHLP6/zB+z+N+XP2bx/1X+mMX//vwxi/+v88cs/g/kj1n8H8wfs/g/lD9m8X84f8zi/0j+mMX/0fwxi/9v8scs/o/lj1n8H88fs/j/Nn/M4v+7/DGL/+/zxyz+f8gfs/j/MX/M4v+n/DGL/xP5Yxb/J/PHLP5P5Y9Z/P+cP2bxfzp/zOL/TP6Yxf/Z/DGL/1/yxyz+f80fs/j/LX/M4v9c/pjF/+/5Yxb/5/PHLP4v5I9Z/F/MH7P4v5Q/ZvF/OX/M4v9K/pjFf2T+mMR/0oH8MYv/kPwxi//Q/DGL/7D8MYv/ePljFv/h+WMW//Hzxyz+E+SPWfxH5I9Z/CfMH7P4T5Q/ZvGfOH/M4j9J/pjFf9L8MYv/ZPljFv/J88cs/lPkj1n8p8wfs/hPlT9m8X9b/pjFf+r8MYv/2/PHLP7vyB+z+L8zf8ziP03+mMX/XfljFv9p88cs/u/OH7P4vyd/zOI/Xf6Yxf+9+WMW/+nzxyz+M+SPWfxnzB+z+M+UP2bxnzl/zOI/S/6Yxf99+WMW/1nzxyz+s+WPWfxnzx+z+L8/f8ziP0f+mMV/zvwxi/8H8scs/nPlj1n8584fs/jPkz9m8Z83f8ziP1/+mMV//vwxi/8C+WMW/wXzxyz+H8wfs/h/KH/M4r9Q/pjFf+H8MYv/IvljFv9F88cs/ovlj1n8F88fs/gvkT9m8V8yf8ziv1T+mMV/6fwxi/8y+WMW/2Xzxyz+y+WPWfyXzx+z+K+QP2bxXzF/zOK/Uv6YxX/l/DGL/yr5Yxb/VfPHLP6r5Y9Z/FfPH7P4r5E/ZvFfM3/M4r9W/pjFf+38MYv/OvljFv9188cs/uvlj1n8188fs/hvkD9m8d8wf8ziv1H+mMV/4/wxi/8m+WMW/03zxyz+m+WPWfw3zx+z+G+RP2bx3zJ/zOK/Vf6YxX/r/DGL/zb5Yxb/D+ePWfy3zR+z+G+XP2bx3z5/zOK/Q/6YxX/H/DGL/075Yxb/nfPHLP675I9Z/HfNH7P475Y/ZvHfPX/M4r9H/pjFf8/8MYv/XvljFv+P5I9Z/PfOH7P475M/ZvHfN3/M4v/R/DGL/375Yxb/j+WPWfz3zx+z+B+QP2bxPzB/zOJ/UP6Yxf/g/DGL/yH5Yxb/Q/PHLP6H5Y9Z/A/PH7P4H5E/ZvH/eP6Yxf/I/DGL/1H5Yxb/o/PHLP7H5I9Z/I/NH7P4H5c/ZvH/RP6Yxf/4/DGL/wn5Yxb/T+aPWfw/lT9m8T8xf8zi/+n8MYv/SfljFv+T88cs/qfkj1n8T80fs/iflj9m8f9M/pjF//T8MYv/GfljFv/P5o9Z/D+XP2bxPzN/zOJ/Vv6Yxf/z+WMW/7Pzxyz+X8gfs/ifkz9m8T83f8zif17+mMX/i/ljFv/z88cs/hfkj1n8L8wfs/hflD9m8f9S/pjF/+L8MYv/JfljFv9L88cs/pflj1n8v5w/ZvG/PH/M4v+V/DGL/1fzxyz+V+SPWfy/lj9m8b8yf8zi//X8MYv/VfljFv+r88cs/t/IH7P4fzN/zOJ/Tf6Yxf/a/DGL/3X5Yxb/b+WPWfyvzx+z+H87f8zif0P+mMX/xvwxi/9N+WMW/5vzxyz+t+SPWfy/kz9m8f9u/pjF/3v5Yxb/7+ePWfx/kD9m8f9h/pjF/0f5Yxb/W/PHLP4/zh+z+P8kf8zif1v+mMX/p/ljFv/b88cs/nfkj1n8f5Y/ZvG/M3/M4n9X/pjF/+f5Yxb/X+SPWfzvzh+z+N+TP2bxvzd/zOL/y/wxi/99+WMW/1/lj1n8788fs/j/On/M4v9A/pjF/8H8MYv/Q/ljFv+H88cs/o/kj1n8H80fs/j/Jn/M4v9Y/pjF//H8MYv/b/PHLP6/yx+z+P8+f8zi/4f8MYv/H/PHLP5/yh+z+D+RP2bxfzJ/zOL/VP6Yxf/P+WMW/6fzxyz+z+SPWfyfzR+z+P8lf8zi/9f8MYv/3/LHLP7P5Y9Z/P+eP2bxfz5/zOL/Qv6Yxf/F/DGL/0v5Yxb/l/PHLP6v5I9Z/Efmj0n8JxvIH7P4D8kfs/gPzR+z+A/LH7P4j5c/ZvEfnj9m8R8/f8ziP0H+mMV/RP6YxX/C/DGL/0T5Yxb/ifPHLP6T5I9Z/CfNH7P4T5Y/ZvGfPH/M4j9F/pjFf8r8MYv/VPljFv+35Y9Z/KfOH7P4vz1/zOL/jvwxi/8788cs/tPkj1n835U/ZvGfNn/M4v/u/DGL/3vyxyz+0+WPWfzfmz9m8Z8+f8ziP0P+mMV/xvwxi/9M+WMW/5nzxyz+s+SPWfzflz9m8Z81f8ziP1v+mMV/9vwxi//788cs/nPkj1n858wfs/h/IH/M4j9X/pjFf+78MYv/PPljFv9588cs/vPlj1n8588fs/gvkD9m8V8wf8zi/8H8MYv/h/LHLP4L5Y9Z/BfOH7P4L5I/ZvFfNH/M4r9Y/pjFf/H8MYv/EvljFv8l88cs/kvlj1n8l84fs/gvkz9m8V82f8ziv1z+mMV/+fwxi/8K+WMW/xXzxyz+K+WPWfxXzh+z+K+SP2bxXzV/zOK/Wv6YxX/1/DGL/xr5Yxb/NfPHLP5r5Y9Z/NfOH7P4r5M/ZvFfN3/M4r9e/pjFf/38MYv/BvljFv8N88cs/hvlj1n8N84fs/hvkj9m8d80f8ziv1n+mMV/8/wxi/8W+WMW/y3zxyz+W+WPWfy3zh+z+G+TP2bx/3D+mMV/2/wxi/92+WMW/+3zxyz+O+SPWfx3zB+z+O+UP2bx3zl/zOK/S/6YxX/X/DGL/275Yxb/3fPHLP575I9Z/PfMH7P475U/ZvH/SP6YxX/v/DGL/z75Yxb/ffPHLP4fzR+z+O+XP2bx/1j+mMV///wxi/8B+WMW/wPzxyz+B+WPWfwPzh+z+B+SP2bxPzR/zOJ/WP6Yxf/w/DGL/xH5Yxb/j+ePWfyPzB+z+B+VP2bxPzp/zOJ/TP6Yxf/Y/DGL/3H5Yxb/T+SPWfyPzx+z+J+QP2bx/2T+mMX/U/ljFv8T88cs/p/OH7P4n5Q/ZvE/OX/M4n9K/pjF/9T8MYv/afljFv/P5I9Z/E/PH7P4n5E/ZvH/bP6Yxf9z+WMW/zPzxyz+Z+WPWfw/nz9m8T87f8zi/4X8MYv/OfljFv9z88cs/uflj1n8v5g/ZvE/P3/M4n9B/pjF/8L8MYv/RfljFv8v5Y9Z/C/OH7P4X5I/ZvG/NH/M4n9Z/pjF/8v5Yxb/y/PHLP5fyR+z+H81f8zif0X+mMX/a/ljFv8r88cs/l/PH7P4X5U/ZvG/On/M4v+N/DGL/zfzxyz+1+SPWfyvzR+z+F+XP2bx/1b+mMX/+vwxi/+388cs/jfkj1n8b8wfs/jflD9m8b85f8zif0v+mMX/O/ljFv/v5o9Z/L+XP2bx/37+mMX/B/ljFv8f5o9Z/H+UP2bxvzV/zOL/4/wxi/9P8scs/rflj1n8f5o/ZvG/PX/M4n9H/pjF/2f5Yxb/O/PHLP535Y9Z/H+eP2bx/0X+mMX/7vwxi/89+WMW/3vzxyz+v8wfs/jflz9m8f9V/pjF//78MYv/r/PHLP4P5I9Z/B/MH7P4P5Q/ZvF/OH/M4v9I/pjF/9H8MYv/b/LHLP6P5Y9Z/B/PH7P4/zZ/zOL/u/wxi//v88cs/n/IH7P4/zF/zOL/p/wxi/8T+WMW/yfzxyz+T+WPWfz/nD9m8X86f8zi/0z+mMX/2fwxi/9f8scs/n/NH7P4/y1/zOL/XP6Yxf/v+WMW/+fzxyz+L+SPWfxfzB+z+L+UP2bxfzl/zOL/Sv6YxX9k/pjEf/KB/DGL/5D8MYv/0Pwxi/+w/DGL/3j5Yxb/4fljFv/x88cs/hPkj1n8R+SPWfwnzB+z+E+UP2bxnzh/zOI/Sf6YxX/S/DGL/2T5Yxb/yfPHLP5T5I9Z/KfMH7P4T5U/ZvF/W/6YxX/q/DGL/9vzxyz+78gfs/i/M3/M4j9N/pjF/135Yxb/afPHhtx66KkHj777H+3/7vwxy/H/nvwxi/90+WMW//fmj1n8p88fs/jPkD9m8Z8xf8ziP1P+mMV/5vwxi/8s+WMW//flj1n8Z80fs/jPlj9m8Z89f8zi//78MYv/HPljFv8588cs/h/IH7P4z5U/ZvGfO3/M4j9P/pjFf978MYv/fPljFv/588cs/gvkj1n8F8wfs/h/MH/M4v+h/DGL/0L5Yxb/hfPHLP6L5I9Z/BfNH7P4L5Y/ZvFfPH/M4r9E/pjFf8n8MYv/UvljFv+l88cs/svkj1n8l80fs/gvlz9m8V8+f8ziv0L+mMV/xfwxi/9K+WMW/5Xzxyz+q+SPWfxXzR+z+K+WP2bxXz1/zOK/Rv6YxX/N/DGL/1r5Yxb/tfPHLP7r5I9Z/NfNH7P4r5c/ZvFfP3/M4r9B/pjFf8P8MYv/RvljFv+N88cs/pvkj1n8N80fs/hvlj9m8d88f8ziv0X+mMV/y/wxi/9W+WMW/63zxyz+2/x/7Nt7kJ11fcfxs7v57QaM4WKEiGAIgRAlIckSSYJEamw7TR3jqHRqbTtDTEJISMRcxCRWCAooWNAgWqBWChir2AgSWwFvoahQiRWtYr014gUvlYBoA62229lkN2aXrzvskycPHb6v1x/ZPWf9HgLvkQ9nM6t/KEv/1+gfytJ/of6hLP0X6R/K0n+x/qEs/c/UP5Sl/xL9Q1n6n6V/KEv/pfqHsvRfpn8oS/+z9Q9l6b9c/1CW/iv0D2Xp/1r9Q1n6n6N/KEv/1+kfytJ/pf6hLP1X6R/K0n+1/qEs/dfoH8rS//X6h7L0P1f/UJb+b9A/lKX/Wv1DWfqv0z+Upf96/UNZ+r9R/1CW/n+hfyhL/zfpH8rS/zz9Q1n6n69/KEv/DfqHsvS/QP9Qlv5v1j+Upf9b9A9l6X+h/qEs/S/SP5Sl/8X6h7L0f6v+oSz936Z/KEv/S/QPZel/qf6hLP3frn8oS/+/1D+Upf9l+oey9L9c/1CW/u/QP5Sl/zv1D2Xpv1H/UJb+V+gfytL/XfqHsvS/Uv9Qlv7v1j+Upf979A9l6f9X+oey9L9K/1CW/lfrH8rS/xr9Q1n6/7X+oSz936t/KEv/v9E/lKX/+/QPZel/rf6hLP3/Vv9Qlv7X6R/K0v96/UNZ+t+gfyhL//frH8rSf5P+oSz9P6B/KEv/v9M/lKX/B/UPZen/If1DWfrfqH8oS/8PB/1f0dXkb+z/pyz9/97//0NZ+m/WP5Sl/0f0D2Xpf5P+oSz9b9Y/lKX/R/UPZel/i/6hLP236B/K0v9j+oey9P8H/UNZ+v+j/qEs/T+ufyhL/1v1D2Xpf5v+oSz9b9c/lKX/J/QPZen/Sf1DWfp/Sv9Qlv6f1j+Upf9n9A9l6b9V/1CW/nfoH8rS/5/0D2Xpf6f+oSz9P6t/KEv/z+kfytL/8/qHsvS/S/9Qlv536x/K0v+f9Q9l6f8F/UNZ+t+jfyhL/236h7L0/6L+oSz9/0X/UJb+X9I/lKX/vfqHsvT/sv6hLP2/on8oS/9/1T+Upf9X9Q9l6f81/UNZ+t+nfyhL/6/rH8rS/9/0D2Xp/w39Q1n6f1P/UJb+39I/lKX/t/UPZen/Hf1DWfr/u/6hLP236x/K0v+7+oey9L9f/1CW/t/TP5Sl//f1D2Xp/wP9Q1n6/1D/UJb+D+gfytL/R/qHsvT/sf6hLP1/on8oS/+f6h/K0v8/9A9l6f8z/UNZ+j+ofyhL/x36h7L0f0j/UJb+D+sfytL/5/qHsvR/RP9Qlv6/0D+Upf8v9Q9l6f+f+oey9N+pfyhL/0f1D2Xp/5j+oSz9/0v/UJb+/61/KEv/X+kfytL/1/qHsvT/H/1DWfr/r/6hLP179A8l6X9wS/9Qlv5t+oey9G/XP5Slf4f+oSz9R+gfytK/6B/K0r9T/1CW/l36h7L0H6l/KEv/A/QPZel/oP6hLP2fpn8oS/9R+oey9H+6/qEs/UfrH8rS/yD9Q1n6H6x/KEv/Q/QPZel/qP6hLP2foX8oS/8x+oey9H+m/qEs/Q/TP5Sl/+H6h7L0H6t/KEv/Z+kfytL/CP1DWfo/W/9Qlv5H6h/K0v8o/UNZ+j9H/1CW/uP0D2Xpf7T+oSz9x+sfytL/GP1DWfpP0D+Upf+x+oey9D9O/1CW/hP1D2Xpf7z+oSz9J+kfytL/ufqHsvR/nv6hLP1P0D+Upf9k/UNZ+k/RP5Sl/4n6h7L0n6p/KEv/afqHsvSfrn8oS/9u/UNZ+p+kfyhL/xn6h7L0f77+oSz9T9Y/lKX/TP1DWfrP0j+Upf9s/UNZ+p+ifyhL/xfoH8rS/1T9Q1n6z9E/lKX/C/UPZel/mv6hp1x/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANifVq9bf/aC5csXr/KJT3zikz2fPNn/ZgIAAOr2m//of7J/JwAAAMD+Mm/+ix7saBvwVMfeD4764uJdH2c8+qqzNn3vM3P6P/Z9+SXBS7bv/aCnp6fnrnseflXfw65Wq9X7V/udvscjBx/3vv75cy6atvtRaX3hvPFtt/78D2ZdPuXcmbd1Hv1A2fVsaZ1x5tLli6e1t1qlo7TW9j6Y3tZqlc7Semfvg+7eB12l9cHeByftenBAa2vvgxMXnrN8Ue8Tj/tLA0Aa8+ZvaHUMWOzWgP8a2Hv/z59z86T+j0O8ZP+rjWj17f9Ff3TrtwZ9rd9v2f/+1y9tg/d/2H+DAMDjDG//77y5/+MQL/m49//3Tdp5VfS1377//a9f2u0/ANQv+P7/gI0e/H3/Qd//Pzp4yT3357597bW9+z934cvG9D014ol8//83r186Bu9/+4Dv/7e1WmVE//f/u1qtUvbxHwcApDBv/gUPDvX+f+j9H3HEoJu2vfe/45bt7b37/4ZRV17R91QZ5v6PGOr9/8u2Dvy9AgBPzLz51/UMev8/jP1vTQxecs/+3/CLES/v3f9Hbmpfs9fXhrP/ZfD+T12z4nVTV69bP2XpigVLFi9Z/NrZ3d0zZ8ycNrt76q7vCOz+dR//oQDAU9y+vf9vHTjopq3V+uGe+zFdF2/u3f8zR406pu+pkcPc/84h3/9/1/t/ABjgmPZWZ2dr7YI1a1ZN3/1r/8Pu3b/u/p8F+z+MP/+f0P9zAP0/M9jWao3dc7/pkK2X9+7/xe1v/EjfU53D3P+uofb/9EE/qwgAPDH7+P5/0aCbAfu/495lL+7d/7dtu3Z031PD/fP/kUPu/xne/wNAFfPm79830b37/7ufu/T+atflAD//BwD1a2L/J331l39W7bocaP8BoH5N7P8NO9ffU+26PM3+A0D9mtj/tg0/mFDtuoyy/wBQvyb2/9Lrl32s2nV5uv0HgPo1sf8PbBlzQLXrMtr+A0D9mtj/FRuveV+163KQ/QeA+jWx/9fc8aF3VLsuB9t/AKhfE/t/yPePH1vtuhxi/wGgfk3s/5se+ZNN1a7LofYfAOrXxP7vvPfr3dWuyzPsPwDUr4n9P/0D875Z7bqMsf8AUL8m9n/7hXe9tNp1eab9B4D6NbH/W95928PVrsth9h8A6tfE/s/6+Mwl1a7L4fYfAOrXxP53jl56bLXrMtb+A0D9mtj/yyb/aEu16/Is+w8A9Wti/++fc/XoatflCPsPAPVrYv+XjTv86mrX5dn2HwDq18T+3730kpXVrsuR9h8A6tfE/r/4JV0Vd7scZf8BoH5N7P/UV6/702rX5Tn2HwDq18T+v3/to9uqXZdx9h8A6tfE/t/xq3Hrql2Xo+0/ANSvif3/w29s3FHtuoy3/wBQvyb2f+LdD72y2nU5xv4DQP2a2P/NP13w2WrXZYL9B4D6NbH/B723Z3K163Ks/QeA+jWx/xd+euUnql2X4+w/ANSvif3/8U0HdVa7LhPtPwDUr4n9X3jZBRurXZfj7T8A1K+J/f/zGdu/Uu26TLL/AFC/Jvb/vsNe/nvVrstz7T8A1K+J/b+9a+pj1a7L8+w/ANSvif2fftx151S7LifYfwCoXxP7/65XnvbWatdlsv0HgPo1sf9jV3704GrXZYr9B4D6NbH/a8740uZq1+VE+w8A9Wti/3vmvuiUatdlqv0HgPo1sf8jD111QrXrMs3+A0D9mtj/t0z79SerXZfp9h8A6tfE/j80/s1t1a5Lt/0HgPo1sf+LOka9p9p1Ocn+A0D9mtj/z7/+ivOqXZcZ9h8A6tfE/r/0j4/8SbXr8nz7DwD1a2L/x//+a06vdl1Otv8AUL8m9v/GRT+7s9p1mWn/AaB+Tez/ld+5ZUO16zLL/gNA/ZrY/3E9px5e7brMtv8AUL8m9n/1jrk3Vrsup9h/AKhfE/v/2LZtc6pdlxfYfwCoXxP7/+rbX/G1atflVPsPAPVrYv+/fNW351a7LnPsPwDUr4n9/9Ql1/dUuy4vtP8AUL8m9v/kD08+q9p1Oc3+AwAAAAAAAAAAAAAAAJDR6nXrz16wfPniVfvxkyf77xEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgP9jBw4EAAAAAID8XxuhqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqCjtwIAAAAAAA5P/aCFVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVXYgQMZAAAAAGH+1nm0HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAICbAgAA//+C6PAH") mkdir(&(0x7f0000000100)='./bus\x00', 0x0) chdir(&(0x7f0000000540)='./bus\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f00000008c0)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='workdir=./file1,lowerdir=./file0,upperdir=./bus,index=on']) syz_mount_image$btrfs(&(0x7f0000005100), &(0x7f0000005140)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6ff96376e365b18f076368652c6e6f61750a5e14afc0228d8d2c7265a7ce06ef726966792c00"], 0x1, 0x50ed, &(0x7f000000a2c0)="$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") chdir(&(0x7f0000000140)='./bus\x00') mkdir(&(0x7f0000000000)='./file1\x00', 0x0) 11:19:55 executing program 4: r0 = openat$udambuf(0xffffff9c, &(0x7f0000000340), 0x2) vmsplice(r0, 0x0, 0x0, 0x0) [ 446.121635][T12263] loop1: detected capacity change from 0 to 64 [ 446.129875][T12265] loop2: detected capacity change from 0 to 64 11:19:55 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x54d882, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x93e, 0x28) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) open(&(0x7f0000002300)='./file0\x00', 0x282800, 0x80) (async, rerun: 32) r5 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (rerun: 32) fallocate(r4, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x0, r5, 0x1f, 0x0, 0x81}) (async) write$FUSE_INTERRUPT(r4, &(0x7f00000022c0)={0x10, 0x0, r2}, 0x10) copy_file_range(r0, &(0x7f0000000200)=0x2000000000000000, 0xffffffffffffffff, &(0x7f0000002280)=0x668, 0xffffffff, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x7d3343, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x121042, 0x100) 11:19:55 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async, rerun: 32) open(&(0x7f0000000200)='./file0\x00', 0x20000, 0x1) (async, rerun: 32) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async, rerun: 32) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (rerun: 32) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async, rerun: 64) creat(&(0x7f0000000080)='./file1\x00', 0x0) (rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 446.204770][T12274] loop5: detected capacity change from 0 to 64 11:19:55 executing program 4: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) write$damon_init_regions(r0, 0x0, 0x0) 11:19:55 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) (async) r4 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) sendfile(r2, r4, &(0x7f0000000200)=0x5, 0x0) [ 446.291979][ T27] audit: type=1804 audit(1688296795.480:538): pid=12274 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3324177784/syzkaller.A4WWgK/348/file0/file0" dev="loop5" ino=4 res=1 errno=0 [ 446.320351][T12279] loop1: detected capacity change from 0 to 64 11:19:55 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0xa40, 0x80) [ 446.407222][ T27] audit: type=1800 audit(1688296795.560:539): pid=12285 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1950 res=0 errno=0 11:19:55 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000200)='./file0\x00', 0x20000, 0x1) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:55 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000002280)={'#! ', './bus/../file0', [{0x20, '/dev/loop'}, {0x20, '/dev/loop'}, {0x20, '({*-},%#&\''}, {0x20, '-'}, {0x20, ','}, {0x20, '@,-%,'}, {0x20, ':}-[[^'}, {0x20, '+\'+$&{+\':{#{#&-{*%'}, {0x20, '^^/+[('}], 0xa, "091b3e02dedb28c63379e8e9a74effb0f1699e6b1fceb986174a9c843cdea3494a450017d683c904b4e026129b39e0c9ad8c28f910b58fd4f48975d2900072e16ea349b15d5dab540365afccd0ae43b5cb227b382fbff32a9f499d63d29b916e53c8487854286e8a48d3f882b7f8a3ec9c519b96822a4a0562af140d0ee3c3d2e2ec669eeb81464ca1ed2db3b99ab56834df387a62c924"}, 0xf3) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:55 executing program 4: quotactl$Q_GETNEXTQUOTA(0xffffffff800008ff, 0x0, 0xee01, 0x0) 11:19:55 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r1, 0x0, 0x2) [ 446.500116][T12296] loop5: detected capacity change from 0 to 64 [ 446.507438][ T27] audit: type=1800 audit(1688296795.690:540): pid=12297 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1963 res=0 errno=0 [ 446.595217][T12305] loop1: detected capacity change from 0 to 64 [ 446.605933][ T27] audit: type=1800 audit(1688296795.780:541): pid=12307 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1962 res=0 errno=0 [ 447.111309][T12270] loop0: detected capacity change from 0 to 32768 [ 447.126889][T12270] XFS (loop0): Mounting V5 Filesystem ca7e2101-b8f1-4838-8e2d-7637b90620e6 [ 447.160874][T12270] XFS (loop0): Ending clean mount [ 447.167350][T12270] XFS (loop0): Quotacheck needed: Please wait. [ 447.198481][T12270] XFS (loop0): Quotacheck: Done. 11:19:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 11:19:56 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async, rerun: 64) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (rerun: 64) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) (async) r4 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) sendfile(r2, r4, &(0x7f0000000200)=0x5, 0x0) 11:19:56 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) lstat(&(0x7f0000002280)='./file1\x00', &(0x7f00000022c0)) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x24000, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x100000b, 0x110, r2, 0x712cd000) 11:19:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fcntl$setownex(r0, 0x25, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) 11:19:56 executing program 3: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 11:19:56 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000002280)={'#! ', './bus/../file0', [{0x20, '/dev/loop'}, {0x20, '/dev/loop'}, {0x20, '({*-},%#&\''}, {0x20, '-'}, {0x20, ','}, {0x20, '@,-%,'}, {0x20, ':}-[[^'}, {0x20, '+\'+$&{+\':{#{#&-{*%'}, {0x20, '^^/+[('}], 0xa, "091b3e02dedb28c63379e8e9a74effb0f1699e6b1fceb986174a9c843cdea3494a450017d683c904b4e026129b39e0c9ad8c28f910b58fd4f48975d2900072e16ea349b15d5dab540365afccd0ae43b5cb227b382fbff32a9f499d63d29b916e53c8487854286e8a48d3f882b7f8a3ec9c519b96822a4a0562af140d0ee3c3d2e2ec669eeb81464ca1ed2db3b99ab56834df387a62c924"}, 0xf3) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 447.310855][T12323] loop2: detected capacity change from 0 to 64 [ 447.336049][ T27] audit: type=1800 audit(1688296796.530:542): pid=12332 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1971 res=0 errno=0 11:19:56 executing program 3: r0 = openat$smackfs_access(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/access2\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'net_cls'}, {0x2b, 'rdma'}, {0x2d, 'freezer'}]}, 0x18) [ 447.337955][T12328] loop5: detected capacity change from 0 to 64 11:19:56 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000002280)={'#! ', './bus/../file0', [{0x20, '/dev/loop'}, {0x20, '/dev/loop'}, {0x20, '({*-},%#&\''}, {0x20, '-'}, {0x20, ','}, {0x20, '@,-%,'}, {0x20, ':}-[[^'}, {0x20, '+\'+$&{+\':{#{#&-{*%'}, {0x20, '^^/+[('}], 0xa, "091b3e02dedb28c63379e8e9a74effb0f1699e6b1fceb986174a9c843cdea3494a450017d683c904b4e026129b39e0c9ad8c28f910b58fd4f48975d2900072e16ea349b15d5dab540365afccd0ae43b5cb227b382fbff32a9f499d63d29b916e53c8487854286e8a48d3f882b7f8a3ec9c519b96822a4a0562af140d0ee3c3d2e2ec669eeb81464ca1ed2db3b99ab56834df387a62c924"}, 0xf3) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r0, &(0x7f0000002280)={'#! ', './bus/../file0', [{0x20, '/dev/loop'}, {0x20, '/dev/loop'}, {0x20, '({*-},%#&\''}, {0x20, '-'}, {0x20, ','}, {0x20, '@,-%,'}, {0x20, ':}-[[^'}, {0x20, '+\'+$&{+\':{#{#&-{*%'}, {0x20, '^^/+[('}], 0xa, "091b3e02dedb28c63379e8e9a74effb0f1699e6b1fceb986174a9c843cdea3494a450017d683c904b4e026129b39e0c9ad8c28f910b58fd4f48975d2900072e16ea349b15d5dab540365afccd0ae43b5cb227b382fbff32a9f499d63d29b916e53c8487854286e8a48d3f882b7f8a3ec9c519b96822a4a0562af140d0ee3c3d2e2ec669eeb81464ca1ed2db3b99ab56834df387a62c924"}, 0xf3) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) 11:19:56 executing program 4: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') mount_setattr(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000140)={0x0, 0x0, 0x80000}, 0x20) [ 447.403312][ T5020] XFS (loop0): Unmounting Filesystem ca7e2101-b8f1-4838-8e2d-7637b90620e6 [ 447.449279][ T27] audit: type=1800 audit(1688296796.560:543): pid=12331 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1972 res=0 errno=0 11:19:56 executing program 3: r0 = openat$autofs(0xffffff9c, &(0x7f0000004240), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 11:19:56 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) lstat(&(0x7f0000002280)='./file1\x00', &(0x7f00000022c0)) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x24000, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x100000b, 0x110, r2, 0x712cd000) [ 447.561238][T12339] loop1: detected capacity change from 0 to 64 11:19:56 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) readv(r0, 0x0, 0x0) [ 447.661490][T12352] loop2: detected capacity change from 0 to 64 [ 447.757301][ T27] audit: type=1800 audit(1688296796.950:544): pid=12353 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1957 res=0 errno=0 11:19:57 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0xc01, 0x0) write$smackfs_load(r0, 0x0, 0x0) 11:19:57 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$damon_contexts(r0, 0x0, 0x0) 11:19:57 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:57 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x41) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0xc00c0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:57 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0, &(0x7f00000001c0)) 11:19:57 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) lstat(&(0x7f0000002280)='./file1\x00', &(0x7f00000022c0)) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x24000, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x100000b, 0x110, r2, 0x712cd000) 11:19:57 executing program 4: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000000000), 0x60201, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 11:19:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0x5451, 0x0) [ 448.009372][T12365] loop5: detected capacity change from 0 to 64 [ 448.014043][T12362] loop1: detected capacity change from 0 to 64 [ 448.022056][T12366] loop2: detected capacity change from 0 to 64 11:19:57 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x60441, 0x0) write$yama_ptrace_scope(r0, &(0x7f0000000080)='2\x00', 0x0) 11:19:57 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:57 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) read$FUSE(r0, &(0x7f00000002c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000100)={0x90, 0x0, r1}, 0x90) 11:19:57 executing program 2: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r2 = dup(r0) symlinkat(&(0x7f0000000200)='./bus\x00', r2, &(0x7f0000002280)='./bus\x00') open(&(0x7f00000022c0)='./file2\x00', 0x381981, 0x4) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$BTRFS_IOC_QGROUP_LIMIT(r2, 0x8030942b, &(0x7f0000002300)={0x8, {0x0, 0x0, 0xd2, 0x9, 0x1}}) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:57 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x41) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x41) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0xc00c0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:57 executing program 4: r0 = syz_io_uring_setup(0x3ca2, &(0x7f00000000c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000140), &(0x7f0000000180)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$fb(r2, 0x0, 0x0) 11:19:57 executing program 0: readlinkat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/168, 0xa8) 11:19:57 executing program 3: mount$binderfs(&(0x7f0000000200), &(0x7f0000000040)='./binderfs\x00', &(0x7f0000000080), 0x22534a1, 0x0) [ 448.245709][T12383] loop5: detected capacity change from 0 to 64 [ 448.267938][T12384] loop2: detected capacity change from 0 to 64 [ 448.293016][T12388] loop1: detected capacity change from 0 to 64 11:19:57 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async, rerun: 64) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (rerun: 64) 11:19:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) 11:19:57 executing program 2: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r2 = dup(r0) symlinkat(&(0x7f0000000200)='./bus\x00', r2, &(0x7f0000002280)='./bus\x00') (async, rerun: 32) open(&(0x7f00000022c0)='./file2\x00', 0x381981, 0x4) (rerun: 32) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) ioctl$BTRFS_IOC_QGROUP_LIMIT(r2, 0x8030942b, &(0x7f0000002300)={0x8, {0x0, 0x0, 0xd2, 0x9, 0x1}}) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:57 executing program 3: r0 = epoll_create1(0x0) r1 = io_uring_setup(0x6fb4, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 11:19:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, 0x0) 11:19:57 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async, rerun: 32) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x41) (rerun: 32) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0xc00c0, 0x0) (async, rerun: 32) creat(&(0x7f0000000080)='./file1\x00', 0x0) (rerun: 32) 11:19:57 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fstatfs(r0, &(0x7f0000000100)=""/41) 11:19:57 executing program 3: r0 = epoll_create1(0x0) write$binfmt_elf32(r0, 0x0, 0x0) [ 448.464515][T12397] loop5: detected capacity change from 0 to 64 [ 448.483414][ T27] audit: type=1800 audit(1688296797.680:545): pid=12398 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1960 res=0 errno=0 11:19:57 executing program 4: openat$damon_target_ids(0xffffff9c, 0x0, 0x400000, 0x0) 11:19:57 executing program 2: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r2 = dup(r0) symlinkat(&(0x7f0000000200)='./bus\x00', r2, &(0x7f0000002280)='./bus\x00') (async, rerun: 32) open(&(0x7f00000022c0)='./file2\x00', 0x381981, 0x4) (async, rerun: 32) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) ioctl$BTRFS_IOC_QGROUP_LIMIT(r2, 0x8030942b, &(0x7f0000002300)={0x8, {0x0, 0x0, 0xd2, 0x9, 0x1}}) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:57 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xee01, r4}}, './file0\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000000)='./file1\x00', r7, 0x0) lchown(&(0x7f00000039c0)='./file2\x00', r7, r8) write$FUSE_ENTRY(r1, &(0x7f0000004380)={0x90, 0x0, r2, {0x5, 0x0, 0x3ff, 0x81, 0x80, 0x80000000, {0x6, 0x1, 0x1, 0x4, 0x0, 0x5, 0x20, 0x0, 0x0, 0x4000, 0x6, r6, r8, 0x1, 0x40}}}, 0x90) r9 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r11 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000080)={0x0, r11, 0x1f, 0x0, 0x81}) read$FUSE(r9, &(0x7f0000002280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r10, &(0x7f00000042c0)={0x90, 0xffffffffffffffda, 0x0, {0x6, 0x0, 0xfff, 0x200, 0x2, 0x9, {0x5, 0xdd52, 0x235, 0xe53, 0x2, 0x7a43, 0x80000000, 0x8, 0x8, 0x6000, 0x0, r3, r12, 0x10000, 0x7}}}, 0x90) fdatasync(r11) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000004440)={{0x1, 0x1, 0x18, r5, {0x4, 0x8}}, './file1\x00'}) read$FUSE(r13, &(0x7f0000004480)={0x2020}, 0x2020) write$binfmt_script(r9, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 448.565081][ T27] audit: type=1800 audit(1688296797.710:546): pid=12404 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1965 res=0 errno=0 11:19:57 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, 0x0) 11:19:57 executing program 4: clock_gettime(0x4, &(0x7f0000001680)) 11:19:57 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40040, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0x8010661b, 0x0) [ 448.663768][T12422] loop5: detected capacity change from 0 to 64 [ 448.691153][T12423] loop2: detected capacity change from 0 to 64 11:19:57 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x106) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:57 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xee01, r4}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xee01, r4}}, './file0\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000000)='./file1\x00', r7, 0x0) lchown(&(0x7f00000039c0)='./file2\x00', r7, r8) (async) lchown(&(0x7f00000039c0)='./file2\x00', r7, r8) write$FUSE_ENTRY(r1, &(0x7f0000004380)={0x90, 0x0, r2, {0x5, 0x0, 0x3ff, 0x81, 0x80, 0x80000000, {0x6, 0x1, 0x1, 0x4, 0x0, 0x5, 0x20, 0x0, 0x0, 0x4000, 0x6, r6, r8, 0x1, 0x40}}}, 0x90) r9 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r11 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000080)={0x0, r11, 0x1f, 0x0, 0x81}) read$FUSE(r9, &(0x7f0000002280)={0x2020}, 0x2020) (async) read$FUSE(r9, &(0x7f0000002280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r10, &(0x7f00000042c0)={0x90, 0xffffffffffffffda, 0x0, {0x6, 0x0, 0xfff, 0x200, 0x2, 0x9, {0x5, 0xdd52, 0x235, 0xe53, 0x2, 0x7a43, 0x80000000, 0x8, 0x8, 0x6000, 0x0, r3, r12, 0x10000, 0x7}}}, 0x90) (async) write$FUSE_ENTRY(r10, &(0x7f00000042c0)={0x90, 0xffffffffffffffda, 0x0, {0x6, 0x0, 0xfff, 0x200, 0x2, 0x9, {0x5, 0xdd52, 0x235, 0xe53, 0x2, 0x7a43, 0x80000000, 0x8, 0x8, 0x6000, 0x0, r3, r12, 0x10000, 0x7}}}, 0x90) fdatasync(r11) (async) fdatasync(r11) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000004440)={{0x1, 0x1, 0x18, r5, {0x4, 0x8}}, './file1\x00'}) read$FUSE(r13, &(0x7f0000004480)={0x2020}, 0x2020) write$binfmt_script(r9, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:57 executing program 0: r0 = fsopen(&(0x7f0000000080)='fuse\x00', 0x0) r1 = dup(r0) read$smackfs_access(r1, 0x0, 0x0) 11:19:58 executing program 4: r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = openat$nullb(0xffffff9c, &(0x7f0000000440), 0x0, 0x0) dup3(r1, r0, 0x0) read$dsp(r0, 0x0, 0x0) 11:19:58 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 448.857242][T12437] loop1: detected capacity change from 0 to 64 [ 448.867332][T12436] loop5: detected capacity change from 0 to 64 11:19:58 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000640)='/sys/bus/cpu', 0x0, 0x11) 11:19:58 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x20bc1, 0x0) [ 448.928862][T12442] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 8 prio class 2 11:19:58 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x881, 0x0) write(r0, 0x0, 0x0) 11:19:58 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x106) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x106) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) 11:19:58 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xee01, r4}}, './file0\x00'}) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000000)='./file1\x00', r7, 0x0) lchown(&(0x7f00000039c0)='./file2\x00', r7, r8) (async) write$FUSE_ENTRY(r1, &(0x7f0000004380)={0x90, 0x0, r2, {0x5, 0x0, 0x3ff, 0x81, 0x80, 0x80000000, {0x6, 0x1, 0x1, 0x4, 0x0, 0x5, 0x20, 0x0, 0x0, 0x4000, 0x6, r6, r8, 0x1, 0x40}}}, 0x90) (async) r9 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r11 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000080)={0x0, r11, 0x1f, 0x0, 0x81}) (async) read$FUSE(r9, &(0x7f0000002280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r10, &(0x7f00000042c0)={0x90, 0xffffffffffffffda, 0x0, {0x6, 0x0, 0xfff, 0x200, 0x2, 0x9, {0x5, 0xdd52, 0x235, 0xe53, 0x2, 0x7a43, 0x80000000, 0x8, 0x8, 0x6000, 0x0, r3, r12, 0x10000, 0x7}}}, 0x90) (async) fdatasync(r11) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000004440)={{0x1, 0x1, 0x18, r5, {0x4, 0x8}}, './file1\x00'}) read$FUSE(r13, &(0x7f0000004480)={0x2020}, 0x2020) (async) write$binfmt_script(r9, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:19:58 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0x5452, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) 11:19:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5000001, 0x10012, r0, 0x0) openat$iommufd(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) 11:19:58 executing program 3: epoll_create1(0x12c01fe6a48dfb06) 11:19:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) [ 449.156333][T12459] loop1: detected capacity change from 0 to 64 [ 449.164392][T12458] loop5: detected capacity change from 0 to 64 11:19:58 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop0', 0x0, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/81, 0x51}], 0x1) 11:19:58 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030005777884108f8ec4305c87530bccbf554ae8005780f7485f80f5107628e8f4907866a10d7bea7301dc8c907c39ba7746d9d48ec707a1b3b1b86485c8cec5204520516636a8cf5"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) preadv2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x1, 0x0, 0x3f000, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000004400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x5, "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", 0x0, 0x0, 0x0, 0x4}}}, 0x128) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000480)=ANY=[@ANYRES32]) r4 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x480280, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r5, 0xc4009420, &(0x7f0000001200)={0xa, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, @struct}, {0x0, @struct={0x81, 0x3}, 0x0, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x0, @usage, 0x0, 0x0, [0x0, 0x0, 0x400, 0x0, 0x0, 0x2]}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @usage, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff]}}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000003180)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB(r5, 0xc400941b, &(0x7f0000000140)={r6}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000280)={{r4}, {@val={r6}, @actul_num={@val=0x2b, 0x7, 0x50}}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f00000004c0)={r6, 0x2, 0x0, [0x401, 0x6, 0x75, 0xf0fc, 0x7], [0x3f, 0x0, 0x1, 0x100000000, 0x8, 0x398, 0x7, 0xffffffffffffffff, 0x16d6, 0x3, 0x7, 0x9, 0xffffffff, 0x2, 0x5, 0x8000, 0x4, 0x8, 0x800, 0xfffffffffffffffa, 0x3, 0x7ff, 0x4, 0x1f, 0x4, 0x7331, 0x4, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x2, 0x1, 0x0, 0x8000000000000000, 0x9, 0x3b28, 0xa28c, 0x4, 0x4c, 0x1, 0xffff, 0x6, 0x3, 0x20, 0x400, 0x3, 0x6, 0x4, 0x9, 0x3ff, 0x2, 0x1ff, 0x6, 0x0, 0xffffffffffffffff, 0x86, 0x49, 0x9, 0x0, 0x100000000, 0x0, 0x3, 0x7fffffffffffffff, 0xffce, 0x3, 0x2420, 0x2, 0x7fffffffffffffff, 0xfffffffffffffff7, 0x8000, 0x8000, 0x4, 0x1f, 0x8, 0x6, 0x1000, 0x400, 0x2, 0x100, 0x6, 0x4205, 0xe6b, 0xffffffff, 0x48da8fbc, 0x20, 0x8, 0x400, 0xb0, 0xffffffffffffe85c, 0x19, 0x0, 0x5, 0x7, 0x9, 0x8, 0xcf, 0x6, 0x5, 0x9, 0x5, 0xfff, 0x9, 0x800, 0xffffffffffffffff, 0x5, 0x7fffffff, 0x3, 0x2, 0xda, 0x5, 0xd30, 0x6, 0x70, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0xfffffffffffffcff, 0x5, 0x81, 0x20, 0x1]}) read$FUSE(r3, &(0x7f0000002300)={0x2020}, 0x2020) r7 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x80) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:58 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x106) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000002cc0), 0x2, 0x0) fcntl$getown(r0, 0x9) 11:19:58 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6, 0x80010, r1, 0x315b9000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) sendfile(r4, r5, 0x0, 0x4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r7 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000080)={0x0, r7, 0x1f, 0x0, 0x81}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r6, {0x4}}, './file0\x00'}) io_uring_register$IORING_UNREGISTER_BUFFERS(r8, 0x1, 0x0, 0x0) read$sequencer(r6, &(0x7f0000000200), 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r9 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(r9, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x94040, 0x0) 11:19:58 executing program 3: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)) 11:19:58 executing program 4: r0 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) [ 449.280805][T12475] loop2: detected capacity change from 0 to 64 11:19:58 executing program 3: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) 11:19:58 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030005777884108f8ec4305c87530bccbf554ae8005780f7485f80f5107628e8f4907866a10d7bea7301dc8c907c39ba7746d9d48ec707a1b3b1b86485c8cec5204520516636a8cf5"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030005777884108f8ec4305c87530bccbf554ae8005780f7485f80f5107628e8f4907866a10d7bea7301dc8c907c39ba7746d9d48ec707a1b3b1b86485c8cec5204520516636a8cf5"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/meminfo\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) (async) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) (async) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) preadv2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x1, 0x0, 0x3f000, 0x0) (async) preadv2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x1, 0x0, 0x3f000, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000004400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x5, "eff5d1da1a498cc1ffd2bde9ce317f31e1d8df039882d06f9fc541b737011e7ad92dfd5102c7d657c50cdd7d009d6f74adf080d8b3ec3aa7af802f8296b73e9ff809c546134e55085229b5b9d22d38591d5d9e4477647aa903c077c16f3dcab7f1448322c2714884cb441a4def1d47e5089ca8f8f564f8f080fcc29670538bdc184f61401df16af92adfdf554d4ca2f7e996d439ce7d1517e51eb2068e3d050a373b5ec0760ae9b4547f7bab30e25a06ba98ea676258e1830b97fce1e30c8b4823538f2605162d2454bda4174f663649590ff455887ab62b4363ba62cf213cf2743ab6fedbe1b9ae5c52623a6476f618b278b2479b999dadee9a600f5c4ead85", 0x0, 0x0, 0x0, 0x4}}}, 0x128) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000480)=ANY=[@ANYRES32]) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x480280, 0x0) (async) r4 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x480280, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r5, 0xc4009420, &(0x7f0000001200)={0xa, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, @struct}, {0x0, @struct={0x81, 0x3}, 0x0, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x0, @usage, 0x0, 0x0, [0x0, 0x0, 0x400, 0x0, 0x0, 0x2]}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @usage, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff]}}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000003180)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB(r5, 0xc400941b, &(0x7f0000000140)={r6}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000280)={{r4}, {@val={r6}, @actul_num={@val=0x2b, 0x7, 0x50}}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f00000004c0)={r6, 0x2, 0x0, [0x401, 0x6, 0x75, 0xf0fc, 0x7], [0x3f, 0x0, 0x1, 0x100000000, 0x8, 0x398, 0x7, 0xffffffffffffffff, 0x16d6, 0x3, 0x7, 0x9, 0xffffffff, 0x2, 0x5, 0x8000, 0x4, 0x8, 0x800, 0xfffffffffffffffa, 0x3, 0x7ff, 0x4, 0x1f, 0x4, 0x7331, 0x4, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x2, 0x1, 0x0, 0x8000000000000000, 0x9, 0x3b28, 0xa28c, 0x4, 0x4c, 0x1, 0xffff, 0x6, 0x3, 0x20, 0x400, 0x3, 0x6, 0x4, 0x9, 0x3ff, 0x2, 0x1ff, 0x6, 0x0, 0xffffffffffffffff, 0x86, 0x49, 0x9, 0x0, 0x100000000, 0x0, 0x3, 0x7fffffffffffffff, 0xffce, 0x3, 0x2420, 0x2, 0x7fffffffffffffff, 0xfffffffffffffff7, 0x8000, 0x8000, 0x4, 0x1f, 0x8, 0x6, 0x1000, 0x400, 0x2, 0x100, 0x6, 0x4205, 0xe6b, 0xffffffff, 0x48da8fbc, 0x20, 0x8, 0x400, 0xb0, 0xffffffffffffe85c, 0x19, 0x0, 0x5, 0x7, 0x9, 0x8, 0xcf, 0x6, 0x5, 0x9, 0x5, 0xfff, 0x9, 0x800, 0xffffffffffffffff, 0x5, 0x7fffffff, 0x3, 0x2, 0xda, 0x5, 0xd30, 0x6, 0x70, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0xfffffffffffffcff, 0x5, 0x81, 0x20, 0x1]}) read$FUSE(r3, &(0x7f0000002300)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x80) (async) r7 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x80) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:58 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) read$FUSE(r1, &(0x7f0000002280)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:58 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, &(0x7f00000020c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, &(0x7f0000000000)) mount$fuseblk(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x108000, 0x0) 11:19:58 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000001080)='.pending_reads\x00', 0x62cc2, 0x0) preadv2(r0, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0, 0x14) [ 449.443487][T12490] loop5: detected capacity change from 0 to 64 11:19:58 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async, rerun: 32) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async, rerun: 32) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6, 0x80010, r1, 0x315b9000) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async, rerun: 64) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (rerun: 64) fallocate(r3, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) (async) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) sendfile(r4, r5, 0x0, 0x4) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r7 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000080)={0x0, r7, 0x1f, 0x0, 0x81}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r6, {0x4}}, './file0\x00'}) (rerun: 32) io_uring_register$IORING_UNREGISTER_BUFFERS(r8, 0x1, 0x0, 0x0) (async) read$sequencer(r6, &(0x7f0000000200), 0x0) (async) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) r9 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) (async) write$binfmt_script(r9, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x94040, 0x0) [ 449.536703][T12498] loop2: detected capacity change from 0 to 64 [ 449.569542][T12500] loop1: detected capacity change from 0 to 64 11:19:58 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$smackfs_cipsonum(r0, 0x0, 0x0) 11:19:58 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x7c841, 0x0) 11:19:58 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) (async) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) read$FUSE(r1, &(0x7f0000002280)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip6_tables_targets\x00') write$fb(r0, 0x0, 0x0) 11:19:58 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000002140)={0x20, 0x0, r2}, 0x20) 11:19:58 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030005777884108f8ec4305c87530bccbf554ae8005780f7485f80f5107628e8f4907866a10d7bea7301dc8c907c39ba7746d9d48ec707a1b3b1b86485c8cec5204520516636a8cf5"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) (async) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) (async) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) preadv2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x1, 0x0, 0x3f000, 0x0) (async) preadv2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x1, 0x0, 0x3f000, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000004400)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x5, "eff5d1da1a498cc1ffd2bde9ce317f31e1d8df039882d06f9fc541b737011e7ad92dfd5102c7d657c50cdd7d009d6f74adf080d8b3ec3aa7af802f8296b73e9ff809c546134e55085229b5b9d22d38591d5d9e4477647aa903c077c16f3dcab7f1448322c2714884cb441a4def1d47e5089ca8f8f564f8f080fcc29670538bdc184f61401df16af92adfdf554d4ca2f7e996d439ce7d1517e51eb2068e3d050a373b5ec0760ae9b4547f7bab30e25a06ba98ea676258e1830b97fce1e30c8b4823538f2605162d2454bda4174f663649590ff455887ab62b4363ba62cf213cf2743ab6fedbe1b9ae5c52623a6476f618b278b2479b999dadee9a600f5c4ead85", 0x0, 0x0, 0x0, 0x4}}}, 0x128) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000480)=ANY=[@ANYRES32]) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x480280, 0x0) (async) r4 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x480280, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r5, 0xc4009420, &(0x7f0000001200)={0xa, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, @struct}, {0x0, @struct={0x81, 0x3}, 0x0, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x0, @usage, 0x0, 0x0, [0x0, 0x0, 0x400, 0x0, 0x0, 0x2]}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @usage, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff]}}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000003180)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB(r5, 0xc400941b, &(0x7f0000000140)={r6}) (async) ioctl$BTRFS_IOC_SCRUB(r5, 0xc400941b, &(0x7f0000000140)={r6}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000280)={{r4}, {@val={r6}, @actul_num={@val=0x2b, 0x7, 0x50}}}) (async) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000280)={{r4}, {@val={r6}, @actul_num={@val=0x2b, 0x7, 0x50}}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f00000004c0)={r6, 0x2, 0x0, [0x401, 0x6, 0x75, 0xf0fc, 0x7], [0x3f, 0x0, 0x1, 0x100000000, 0x8, 0x398, 0x7, 0xffffffffffffffff, 0x16d6, 0x3, 0x7, 0x9, 0xffffffff, 0x2, 0x5, 0x8000, 0x4, 0x8, 0x800, 0xfffffffffffffffa, 0x3, 0x7ff, 0x4, 0x1f, 0x4, 0x7331, 0x4, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x2, 0x1, 0x0, 0x8000000000000000, 0x9, 0x3b28, 0xa28c, 0x4, 0x4c, 0x1, 0xffff, 0x6, 0x3, 0x20, 0x400, 0x3, 0x6, 0x4, 0x9, 0x3ff, 0x2, 0x1ff, 0x6, 0x0, 0xffffffffffffffff, 0x86, 0x49, 0x9, 0x0, 0x100000000, 0x0, 0x3, 0x7fffffffffffffff, 0xffce, 0x3, 0x2420, 0x2, 0x7fffffffffffffff, 0xfffffffffffffff7, 0x8000, 0x8000, 0x4, 0x1f, 0x8, 0x6, 0x1000, 0x400, 0x2, 0x100, 0x6, 0x4205, 0xe6b, 0xffffffff, 0x48da8fbc, 0x20, 0x8, 0x400, 0xb0, 0xffffffffffffe85c, 0x19, 0x0, 0x5, 0x7, 0x9, 0x8, 0xcf, 0x6, 0x5, 0x9, 0x5, 0xfff, 0x9, 0x800, 0xffffffffffffffff, 0x5, 0x7fffffff, 0x3, 0x2, 0xda, 0x5, 0xd30, 0x6, 0x70, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0xfffffffffffffcff, 0x5, 0x81, 0x20, 0x1]}) read$FUSE(r3, &(0x7f0000002300)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x80) (async) r7 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x80) write$binfmt_script(r7, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:59 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) (async, rerun: 64) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) (async, rerun: 64) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6, 0x80010, r1, 0x315b9000) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async, rerun: 64) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (rerun: 64) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) fallocate(r3, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) sendfile(r4, r5, 0x0, 0x4) (async, rerun: 32) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async, rerun: 32) r7 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000080)={0x0, r7, 0x1f, 0x0, 0x81}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r6, {0x4}}, './file0\x00'}) io_uring_register$IORING_UNREGISTER_BUFFERS(r8, 0x1, 0x0, 0x0) (async) read$sequencer(r6, &(0x7f0000000200), 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r9 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) (async) write$binfmt_script(r9, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x94040, 0x0) 11:19:59 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x9500, 0x1) [ 449.789708][T12515] loop1: detected capacity change from 0 to 64 11:19:59 executing program 3: r0 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) [ 449.869136][T12522] loop5: detected capacity change from 0 to 64 [ 449.901322][T12525] loop2: detected capacity change from 0 to 64 11:19:59 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000240)) 11:19:59 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) (async) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) read$FUSE(r1, &(0x7f0000002280)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000002280)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 11:19:59 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f00000022c0)='./file0\x00', 0x1000410, &(0x7f0000000100)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = fsmount(r0, 0x1, 0x2) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x4) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) openat$cgroup_ro(r1, &(0x7f0000002280)='net_prio.prioidx\x00', 0x0, 0x0) 11:19:59 executing program 3: r0 = io_uring_setup(0x2236, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, 0x0, 0x0) 11:19:59 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./file1\x00', 0x54cac2, 0x150) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) open(&(0x7f0000002280)='./bus\x00', 0xd2802, 0x9) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$overlay(0x0, &(0x7f0000002300)='./file1\x00', &(0x7f0000002340), 0x0, &(0x7f0000002380)={[], [{@obj_role={'obj_role', 0x3d, '-@{\x19[\'.:-$[#\\'}}, {@fowner_lt={'fowner<', r1}}]}) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) r3 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f00000022c0)={0xa, {0x2, 0x6, 0x2}}, 0xa) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 450.451003][T12541] loop2: detected capacity change from 0 to 64 [ 450.476413][T12543] loop5: detected capacity change from 0 to 64 11:19:59 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x5502, 0x0) [ 450.501710][T12540] loop1: detected capacity change from 0 to 64 11:19:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$vga_arbiter(r0, 0x0, 0x0) 11:19:59 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./file1\x00', 0x54cac2, 0x150) (async, rerun: 64) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) open(&(0x7f0000002280)='./bus\x00', 0xd2802, 0x9) (async, rerun: 32) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (rerun: 32) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$overlay(0x0, &(0x7f0000002300)='./file1\x00', &(0x7f0000002340), 0x0, &(0x7f0000002380)={[], [{@obj_role={'obj_role', 0x3d, '-@{\x19[\'.:-$[#\\'}}, {@fowner_lt={'fowner<', r1}}]}) (async, rerun: 64) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (rerun: 64) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) r3 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async, rerun: 64) write$UHID_GET_REPORT_REPLY(r3, &(0x7f00000022c0)={0xa, {0x2, 0x6, 0x2}}, 0xa) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:19:59 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000440)={'syz0'}, 0x4) 11:19:59 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r4, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f00000066c0)={0x50, 0x0, r5, {0x7, 0x21}}, 0x50) read$FUSE(r4, &(0x7f000000a9c0)={0x2020}, 0x2020) read$FUSE(r4, &(0x7f0000006740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r4, &(0x7f0000000000)={0x10, 0xffffffffffffffda, r6}, 0x10) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r4, &(0x7f00000002c0)={0x90, 0x0, r7}, 0x90) write$FUSE_INTERRUPT(r3, &(0x7f0000000200)={0x10, 0xfffffffffffffffe, r7}, 0x10) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:19:59 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f00000022c0)='./file0\x00', 0x1000410, &(0x7f0000000100)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async, rerun: 32) r2 = fsmount(r0, 0x1, 0x2) (rerun: 32) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x4) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000002280)='net_prio.prioidx\x00', 0x0, 0x0) 11:19:59 executing program 3: r0 = epoll_create1(0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)) 11:20:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000980)='memory.events\x00', 0x275a, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 11:20:00 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000440)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0x40046207, 0x0) [ 450.865133][T12563] loop1: detected capacity change from 0 to 64 [ 450.884419][ T27] kauditd_printk_skb: 16 callbacks suppressed [ 450.884433][ T27] audit: type=1800 audit(1688296800.080:563): pid=12566 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1973 res=0 errno=0 11:20:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./mnt\x00', 0x0, 0x0, 0x10, 0x0, &(0x7f0000000000)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000540)=@v2={0x2, @aes256, 0x0, '\x00', @a}) mknodat(r0, &(0x7f0000000140)='./mnt\x00', 0x0, 0x0) 11:20:00 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f00000022c0)='./file0\x00', 0x1000410, &(0x7f0000000100)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r2 = fsmount(r0, 0x1, 0x2) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x4) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000002280)='net_prio.prioidx\x00', 0x0, 0x0) [ 450.952379][T12555] overlay: Unknown parameter 'obj_role' [ 450.959489][T12564] loop5: detected capacity change from 0 to 64 11:20:00 executing program 0: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000002780), 0x1, 0x0) fcntl$notify(r0, 0x402, 0x0) 11:20:00 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./file1\x00', 0x54cac2, 0x150) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) (rerun: 64) open(&(0x7f0000002280)='./bus\x00', 0xd2802, 0x9) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$overlay(0x0, &(0x7f0000002300)='./file1\x00', &(0x7f0000002340), 0x0, &(0x7f0000002380)={[], [{@obj_role={'obj_role', 0x3d, '-@{\x19[\'.:-$[#\\'}}, {@fowner_lt={'fowner<', r1}}]}) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) r3 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async, rerun: 64) creat(&(0x7f0000000080)='./file1\x00', 0x0) (rerun: 64) write$UHID_GET_REPORT_REPLY(r3, &(0x7f00000022c0)={0xa, {0x2, 0x6, 0x2}}, 0xa) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:00 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x121840, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0x6628, 0x0) 11:20:00 executing program 4: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x8380, 0x0) 11:20:00 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r4, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f00000066c0)={0x50, 0x0, r5, {0x7, 0x21}}, 0x50) read$FUSE(r4, &(0x7f000000a9c0)={0x2020}, 0x2020) read$FUSE(r4, &(0x7f0000006740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r4, &(0x7f0000000000)={0x10, 0xffffffffffffffda, r6}, 0x10) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r4, &(0x7f00000002c0)={0x90, 0x0, r7}, 0x90) (async) write$FUSE_INTERRUPT(r3, &(0x7f0000000200)={0x10, 0xfffffffffffffffe, r7}, 0x10) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 451.128904][ T27] audit: type=1804 audit(1688296800.320:564): pid=12563 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4151449802/syzkaller.qMlj6B/361/file0/file0" dev="loop1" ino=4 res=1 errno=0 11:20:00 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0xa081, 0x0) 11:20:00 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000180), 0x142) write$FUSE_BMAP(r0, 0x0, 0x0) 11:20:00 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/de|/loop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:00 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/de\n/loop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002280), 0x8c83, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:00 executing program 4: r0 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) r1 = openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000004480), 0x2, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000001680)='\xa2-#$\xac(({*}\x00', 0x0, r1) 11:20:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x254200, 0x0) dup3(r1, r0, 0x0) fspick(r1, &(0x7f0000000080)='./file0/file0\x00', 0x0) [ 451.283289][ T27] audit: type=1800 audit(1688296800.420:565): pid=12586 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1958 res=0 errno=0 11:20:00 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$dsp(r0, 0x0, 0x0) 11:20:00 executing program 4: r0 = io_uring_setup(0x4098, &(0x7f0000000300)) fcntl$getownex(r0, 0x402, &(0x7f00000025c0)) [ 451.404573][ T27] audit: type=1800 audit(1688296800.580:566): pid=12600 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1960 res=0 errno=0 [ 451.431603][T12606] loop2: detected capacity change from 0 to 64 [ 451.450696][T12608] loop5: detected capacity change from 0 to 64 11:20:00 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async, rerun: 32) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (rerun: 32) fallocate(r2, 0x0, 0x0, 0x110001) (async, rerun: 64) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) (async, rerun: 64) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async) read$FUSE(r4, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f00000066c0)={0x50, 0x0, r5, {0x7, 0x21}}, 0x50) (async, rerun: 32) read$FUSE(r4, &(0x7f000000a9c0)={0x2020}, 0x2020) (async, rerun: 32) read$FUSE(r4, &(0x7f0000006740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r4, &(0x7f0000000000)={0x10, 0xffffffffffffffda, r6}, 0x10) (async, rerun: 64) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_ENTRY(r4, &(0x7f00000002c0)={0x90, 0x0, r7}, 0x90) (async, rerun: 64) write$FUSE_INTERRUPT(r3, &(0x7f0000000200)={0x10, 0xfffffffffffffffe, r7}, 0x10) (async, rerun: 64) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:00 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) write$sequencer(r0, 0x0, 0x20) 11:20:00 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) read$nci(r0, 0x0, 0x0) [ 451.505957][ T27] audit: type=1804 audit(1688296800.650:567): pid=12600 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4151449802/syzkaller.qMlj6B/362/file0" dev="sda1" ino=1964 res=1 errno=0 11:20:00 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/de\n/loop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002280), 0x8c83, 0x0) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002280), 0x8c83, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:00 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f00000001c0)='.log\x00', 0x1492c3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0x4020940d, &(0x7f0000000440)={@id={0x2, 0x0, @a}}) 11:20:00 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async, rerun: 32) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/de|/loop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 32) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async, rerun: 64) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (rerun: 64) 11:20:00 executing program 3: openat$damon_attrs(0xffffffffffffff9c, &(0x7f0000000000), 0x143000, 0x189) 11:20:00 executing program 0: openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x200c0, 0x0) [ 451.657009][T12617] loop1: detected capacity change from 0 to 64 [ 451.671793][ T27] audit: type=1800 audit(1688296800.850:568): pid=12618 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1962 res=0 errno=0 [ 451.692035][T12622] loop2: detected capacity change from 0 to 64 11:20:00 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 11:20:01 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/de\n/loop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002280), 0x8c83, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/de\n/loop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002280), 0x8c83, 0x0) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) [ 451.748872][T12628] loop5: detected capacity change from 0 to 64 11:20:01 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0x5452, &(0x7f0000000040)={@id={0x2, 0x0, @c}}) openat$khugepaged_scan(0xffffffffffffff9c, 0x0, 0x1, 0x0) 11:20:01 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000200)='./file1\x00', 0x10000, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:01 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x7a642, 0x0) 11:20:01 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/de|/loop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:01 executing program 4: r0 = openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x1) 11:20:01 executing program 0: r0 = openat$urandom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x0) 11:20:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000040)=ANY=[], 0x1, 0x77d, &(0x7f0000000f40)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x6611, 0x0) [ 451.953366][T12643] loop1: detected capacity change from 0 to 64 [ 451.962070][T12647] loop2: detected capacity change from 0 to 64 [ 451.975479][T12648] loop5: detected capacity change from 0 to 64 11:20:01 executing program 4: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0x5450, 0x0) 11:20:01 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000200)='./file1\x00', 0x10000, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000200)='./file1\x00', 0x10000, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) 11:20:01 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) 11:20:01 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1104080, &(0x7f00000003c0)=ANY=[], 0x1, 0x90, &(0x7f0000002280)="$eJzszqGtwmAABOBr88RTXQDBBv8OjEIqwaEgTZiIVRihGyBqMUX8GJCYEvJ94pLLmbveL6t0yXxO5jeH42m33dcMP6lN0iT5T7Luar9t6tY893Ea/pL04zT0S/8FAAA+16a89CalLHYGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4As9AgAA//8x1CCh") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '/proc/crypto\x00'}], 0xa, "acf24872924d27be40b0079262c6f9cec6fa92153a983180e39ddc0ad7cda11be67d2e1771fc7e7327c20dd4de3678f5280716f7ab359d4784cb8fa12b04aa2b0634798434781659aecfbb010bad41736acf52c9bacc21a50de92e0b5366c52f89ec"}, 0x7b) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:01 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000000)='./file1\x00', r3, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000002780)={0x0, 0x0}) ppoll(&(0x7f0000002740)=[{0xffffffffffffffff, 0x8089}, {r5, 0x500}], 0x2, &(0x7f00000027c0)={r6, r7+60000000}, &(0x7f0000002800)={[0x9]}, 0x8) lchown(&(0x7f00000039c0)='./file2\x00', r3, r4) mount$bind(&(0x7f0000002640)='./file1\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0), 0x0, 0x0) mount$binder(0x0, &(0x7f0000002380)='./file2\x00', &(0x7f00000023c0), 0x80, &(0x7f0000002400)={[{@stats}, {}, {@stats}, {}, {@stats}, {@stats}], [{@seclabel}, {@dont_measure}, {@euid_gt={'euid>', r1}}, {@smackfshat={'smackfshat', 0x3d, ']\xfd:&:+(-{}['}}, {@uid_lt={'uid<', r3}}, {@permit_directio}, {@smackfsfloor={'smackfsfloor', 0x3d, '/}!\xcb'}}]}) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r8 = creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r9, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r9, &(0x7f00000066c0)={0x50, 0x0, r10, {0x7, 0x21}}, 0x50) mount$nfs(&(0x7f0000002500)='[\x94#&\x00', &(0x7f0000002540)='./file1\x00', &(0x7f0000002580), 0x4000, &(0x7f00000025c0)={[{'/,\xd3]\'\b{(&-}^'}, {'^#'}, {',5'}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x62, 0x63, 0x31, 0x38, 0x38, 0x61, 0x32], 0x2d, [0x33, 0x35, 0x66, 0x63], 0x2d, [0x38, 0x33, 0x66, 0x38], 0x2d, [0x34, 0x62, 0x65, 0x34], 0x2d, [0x39, 0x66, 0x63, 0x0, 0x38, 0x30, 0x35, 0x32]}}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) write$FUSE_ATTR(r8, &(0x7f0000002300)={0x78, 0x0, r10, {0x7, 0x8, 0x0, {0x5, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x8, 0xf8, 0x8, 0x7, 0x4000, 0x2, r1, r11, 0x10000, 0x101}}}, 0x78) 11:20:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000040)) [ 452.126204][T12658] loop3: detected capacity change from 0 to 2048 [ 452.152227][T12665] loop1: detected capacity change from 0 to 64 11:20:01 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x2a400, 0x0) [ 452.195781][T12668] loop5: detected capacity change from 0 to 64 [ 452.217470][T12673] loop2: detected capacity change from 0 to 64 [ 452.221661][T12658] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 11:20:01 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1104080, &(0x7f00000003c0)=ANY=[], 0x1, 0x90, &(0x7f0000002280)="$eJzszqGtwmAABOBr88RTXQDBBv8OjEIqwaEgTZiIVRihGyBqMUX8GJCYEvJ94pLLmbveL6t0yXxO5jeH42m33dcMP6lN0iT5T7Luar9t6tY893Ea/pL04zT0S/8FAAA+16a89CalLHYGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4As9AgAA//8x1CCh") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '/proc/crypto\x00'}], 0xa, "acf24872924d27be40b0079262c6f9cec6fa92153a983180e39ddc0ad7cda11be67d2e1771fc7e7327c20dd4de3678f5280716f7ab359d4784cb8fa12b04aa2b0634798434781659aecfbb010bad41736acf52c9bacc21a50de92e0b5366c52f89ec"}, 0x7b) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1104080, &(0x7f00000003c0)=ANY=[], 0x1, 0x90, &(0x7f0000002280)="$eJzszqGtwmAABOBr88RTXQDBBv8OjEIqwaEgTZiIVRihGyBqMUX8GJCYEvJ94pLLmbveL6t0yXxO5jeH42m33dcMP6lN0iT5T7Luar9t6tY893Ea/pL04zT0S/8FAAA+16a89CalLHYGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4As9AgAA//8x1CCh") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '/proc/crypto\x00'}], 0xa, "acf24872924d27be40b0079262c6f9cec6fa92153a983180e39ddc0ad7cda11be67d2e1771fc7e7327c20dd4de3678f5280716f7ab359d4784cb8fa12b04aa2b0634798434781659aecfbb010bad41736acf52c9bacc21a50de92e0b5366c52f89ec"}, 0x7b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) 11:20:01 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$smackfs_cipsonum(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/doi\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x0) [ 452.279406][ T27] audit: type=1800 audit(1688296801.470:569): pid=12668 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1976 res=0 errno=0 [ 452.303218][T12678] nfs: Unknown parameter '/' 11:20:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, 0x0) 11:20:01 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 32) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (rerun: 32) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000000)='./file1\x00', r3, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) (async) clock_gettime(0x0, &(0x7f0000002780)={0x0, 0x0}) ppoll(&(0x7f0000002740)=[{0xffffffffffffffff, 0x8089}, {r5, 0x500}], 0x2, &(0x7f00000027c0)={r6, r7+60000000}, &(0x7f0000002800)={[0x9]}, 0x8) lchown(&(0x7f00000039c0)='./file2\x00', r3, r4) (async) mount$bind(&(0x7f0000002640)='./file1\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0), 0x0, 0x0) (async) mount$binder(0x0, &(0x7f0000002380)='./file2\x00', &(0x7f00000023c0), 0x80, &(0x7f0000002400)={[{@stats}, {}, {@stats}, {}, {@stats}, {@stats}], [{@seclabel}, {@dont_measure}, {@euid_gt={'euid>', r1}}, {@smackfshat={'smackfshat', 0x3d, ']\xfd:&:+(-{}['}}, {@uid_lt={'uid<', r3}}, {@permit_directio}, {@smackfsfloor={'smackfsfloor', 0x3d, '/}!\xcb'}}]}) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async, rerun: 32) r8 = creat(&(0x7f0000000080)='./file1\x00', 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async, rerun: 32) read$FUSE(r9, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 32) write$FUSE_INIT(r9, &(0x7f00000066c0)={0x50, 0x0, r10, {0x7, 0x21}}, 0x50) (async) mount$nfs(&(0x7f0000002500)='[\x94#&\x00', &(0x7f0000002540)='./file1\x00', &(0x7f0000002580), 0x4000, &(0x7f00000025c0)={[{'/,\xd3]\'\b{(&-}^'}, {'^#'}, {',5'}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x62, 0x63, 0x31, 0x38, 0x38, 0x61, 0x32], 0x2d, [0x33, 0x35, 0x66, 0x63], 0x2d, [0x38, 0x33, 0x66, 0x38], 0x2d, [0x34, 0x62, 0x65, 0x34], 0x2d, [0x39, 0x66, 0x63, 0x0, 0x38, 0x30, 0x35, 0x32]}}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) write$FUSE_ATTR(r8, &(0x7f0000002300)={0x78, 0x0, r10, {0x7, 0x8, 0x0, {0x5, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x8, 0xf8, 0x8, 0x7, 0x4000, 0x2, r1, r11, 0x10000, 0x101}}}, 0x78) 11:20:01 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000200)='./file1\x00', 0x10000, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:01 executing program 4: r0 = openat$smackfs_syslog(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) lseek(r0, 0x0, 0x0) [ 452.377274][T12687] loop5: detected capacity change from 0 to 64 [ 452.406440][ T5040] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 452.442625][ T27] audit: type=1800 audit(1688296801.630:570): pid=12687 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1945 res=0 errno=0 11:20:01 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x80200) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x5450) 11:20:01 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1104080, &(0x7f00000003c0)=ANY=[], 0x1, 0x90, &(0x7f0000002280)="$eJzszqGtwmAABOBr88RTXQDBBv8OjEIqwaEgTZiIVRihGyBqMUX8GJCYEvJ94pLLmbveL6t0yXxO5jeH42m33dcMP6lN0iT5T7Luar9t6tY893Ea/pL04zT0S/8FAAA+16a89CalLHYGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4As9AgAA//8x1CCh") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '/proc/crypto\x00'}], 0xa, "acf24872924d27be40b0079262c6f9cec6fa92153a983180e39ddc0ad7cda11be67d2e1771fc7e7327c20dd4de3678f5280716f7ab359d4784cb8fa12b04aa2b0634798434781659aecfbb010bad41736acf52c9bacc21a50de92e0b5366c52f89ec"}, 0x7b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:01 executing program 4: r0 = fsopen(&(0x7f0000000400)='cgroup\x00', 0x0) r1 = openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000004480), 0x2, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000001680)='\xa2-#$\xac(({*}\x00', 0x0, r1) read$smackfs_ptrace(r0, 0x0, 0x0) [ 452.504939][T12695] loop2: detected capacity change from 0 to 64 [ 452.540046][T12699] loop1: detected capacity change from 0 to 64 11:20:01 executing program 3: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x5450, 0x0) 11:20:01 executing program 0: r0 = epoll_create1(0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 11:20:01 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@sr0, &(0x7f0000000200)='./file1\x00', 0x0, 0x1008001, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mount$pvfs2(&(0x7f0000002380), &(0x7f00000023c0)='./file1\x00', &(0x7f0000002400), 0x1000000, &(0x7f0000002440)={[{}, {'/dev/loop'}, {'('}, {}, {'/'}, {'bfs\x00'}], [{@permit_directio}]}) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x280040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 452.645754][ T27] audit: type=1800 audit(1688296801.840:571): pid=12709 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1968 res=0 errno=0 [ 452.647274][T12708] loop5: detected capacity change from 0 to 64 11:20:01 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000000)='./file1\x00', r3, 0x0) (async) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) (async) clock_gettime(0x0, &(0x7f0000002780)={0x0, 0x0}) ppoll(&(0x7f0000002740)=[{0xffffffffffffffff, 0x8089}, {r5, 0x500}], 0x2, &(0x7f00000027c0)={r6, r7+60000000}, &(0x7f0000002800)={[0x9]}, 0x8) (async) lchown(&(0x7f00000039c0)='./file2\x00', r3, r4) mount$bind(&(0x7f0000002640)='./file1\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0), 0x0, 0x0) (async) mount$binder(0x0, &(0x7f0000002380)='./file2\x00', &(0x7f00000023c0), 0x80, &(0x7f0000002400)={[{@stats}, {}, {@stats}, {}, {@stats}, {@stats}], [{@seclabel}, {@dont_measure}, {@euid_gt={'euid>', r1}}, {@smackfshat={'smackfshat', 0x3d, ']\xfd:&:+(-{}['}}, {@uid_lt={'uid<', r3}}, {@permit_directio}, {@smackfsfloor={'smackfsfloor', 0x3d, '/}!\xcb'}}]}) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r8 = creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async) read$FUSE(r9, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r9, &(0x7f00000066c0)={0x50, 0x0, r10, {0x7, 0x21}}, 0x50) mount$nfs(&(0x7f0000002500)='[\x94#&\x00', &(0x7f0000002540)='./file1\x00', &(0x7f0000002580), 0x4000, &(0x7f00000025c0)={[{'/,\xd3]\'\b{(&-}^'}, {'^#'}, {',5'}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x62, 0x63, 0x31, 0x38, 0x38, 0x61, 0x32], 0x2d, [0x33, 0x35, 0x66, 0x63], 0x2d, [0x38, 0x33, 0x66, 0x38], 0x2d, [0x34, 0x62, 0x65, 0x34], 0x2d, [0x39, 0x66, 0x63, 0x0, 0x38, 0x30, 0x35, 0x32]}}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) write$FUSE_ATTR(r8, &(0x7f0000002300)={0x78, 0x0, r10, {0x7, 0x8, 0x0, {0x5, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x8, 0xf8, 0x8, 0x7, 0x4000, 0x2, r1, r11, 0x10000, 0x101}}}, 0x78) 11:20:01 executing program 4: r0 = openat$smackfs_syslog(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f00000019c0)={0x2020}, 0x2020) [ 452.709393][T12713] I/O error, dev loop5, sector 56 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 [ 452.756448][T12713] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 452.759958][T12718] loop1: detected capacity change from 0 to 64 11:20:02 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x1000000, &(0x7f0000000080)=ANY=[], 0x1, 0x9d, &(0x7f0000002280)="$eJzs1rGJAkEABdA/GxwXbQMXnBVsD5YiG2pmpAjakK1YwnZgYGqysoxgbrIi7wXzGX7yYZK53M9/aZPxmIy/qcZqu9uvV5t6hq/UJClJpqf/b+v9uqxdefbD7dAPJf2Uc+8FAADe16RL/eqfplyUdN2r/ZlvGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCHeAQAAP//L/walg==") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x2) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:02 executing program 0: r0 = fsopen(&(0x7f0000000000)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x1, 0x8a) 11:20:02 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@sr0, &(0x7f0000000200)='./file1\x00', 0x0, 0x1008001, 0x0) (async) mount(&(0x7f0000000380)=@sr0, &(0x7f0000000200)='./file1\x00', 0x0, 0x1008001, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mount$pvfs2(&(0x7f0000002380), &(0x7f00000023c0)='./file1\x00', &(0x7f0000002400), 0x1000000, &(0x7f0000002440)={[{}, {'/dev/loop'}, {'('}, {}, {'/'}, {'bfs\x00'}], [{@permit_directio}]}) (async) mount$pvfs2(&(0x7f0000002380), &(0x7f00000023c0)='./file1\x00', &(0x7f0000002400), 0x1000000, &(0x7f0000002440)={[{}, {'/dev/loop'}, {'('}, {}, {'/'}, {'bfs\x00'}], [{@permit_directio}]}) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) (async) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x280040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:02 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x88c0, 0x0) [ 452.850006][ T27] audit: type=1800 audit(1688296802.040:572): pid=12725 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1948 res=0 errno=0 [ 452.867523][T12725] nfs: Unknown parameter '/' 11:20:02 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 11:20:02 executing program 2: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000002340)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file2\x00'}) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) newfstatat(0xffffffffffffff9c, &(0x7f00000043c0)='./file3\x00', &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$9p_virtio(&(0x7f0000002280), &(0x7f00000022c0)='./file0\x00', &(0x7f0000002300), 0x1310024, &(0x7f0000004480)={'trans=virtio,', {[{@access_uid={'access', 0x3d, r4}}, {@uname={'uname', 0x3d, '##'}}, {@posixacl}, {@nodevmap}, {@aname={'aname', 0x3d, 'posixacl'}}, {@mmap}, {@cache_loose}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}, {@euid_gt}, {@subj_type={'subj_type', 0x3d, 'b\xe9C '}}, {@obj_role={'obj_role', 0x3d, 'cpuacct.stat\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@uid_gt={'uid>', r3}}]}}) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/dev/lonp0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000240)={0x2020}, 0x2020) r6 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r8 = fcntl$dupfd(r5, 0x406, r5) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000004640)=0x4000) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000080)={0x0, r10, 0x1f, 0x0, 0x81}) move_mount(r8, &(0x7f00000045c0)='./file3\x00', r9, &(0x7f0000004600)='./file4\x00', 0x60) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x80001, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:02 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$smackfs_cipsonum(r0, 0x0, 0x0) [ 452.964207][T12732] loop5: detected capacity change from 0 to 64 [ 452.973155][T12733] loop1: detected capacity change from 0 to 64 [ 453.002011][T12732] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 11:20:02 executing program 4: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 11:20:02 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@sr0, &(0x7f0000000200)='./file1\x00', 0x0, 0x1008001, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mount$pvfs2(&(0x7f0000002380), &(0x7f00000023c0)='./file1\x00', &(0x7f0000002400), 0x1000000, &(0x7f0000002440)={[{}, {'/dev/loop'}, {'('}, {}, {'/'}, {'bfs\x00'}], [{@permit_directio}]}) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x280040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x280040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 453.059707][T12741] loop2: detected capacity change from 0 to 64 11:20:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0xc0760, 0x0) read$sequencer(r0, 0x0, 0x0) 11:20:02 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x1000000, &(0x7f0000000080)=ANY=[], 0x1, 0x9d, &(0x7f0000002280)="$eJzs1rGJAkEABdA/GxwXbQMXnBVsD5YiG2pmpAjakK1YwnZgYGqysoxgbrIi7wXzGX7yYZK53M9/aZPxmIy/qcZqu9uvV5t6hq/UJClJpqf/b+v9uqxdefbD7dAPJf2Uc+8FAADe16RL/eqfplyUdN2r/ZlvGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCHeAQAAP//L/walg==") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x2) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:02 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0xd0043, 0x2) 11:20:02 executing program 2: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000002340)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file2\x00'}) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) newfstatat(0xffffffffffffff9c, &(0x7f00000043c0)='./file3\x00', &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$9p_virtio(&(0x7f0000002280), &(0x7f00000022c0)='./file0\x00', &(0x7f0000002300), 0x1310024, &(0x7f0000004480)={'trans=virtio,', {[{@access_uid={'access', 0x3d, r4}}, {@uname={'uname', 0x3d, '##'}}, {@posixacl}, {@nodevmap}, {@aname={'aname', 0x3d, 'posixacl'}}, {@mmap}, {@cache_loose}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}, {@euid_gt}, {@subj_type={'subj_type', 0x3d, 'b\xe9C '}}, {@obj_role={'obj_role', 0x3d, 'cpuacct.stat\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@uid_gt={'uid>', r3}}]}}) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/dev/lonp0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000240)={0x2020}, 0x2020) r6 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) r7 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r8 = fcntl$dupfd(r5, 0x406, r5) (async, rerun: 64) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000004640)=0x4000) (rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async, rerun: 64) r10 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (rerun: 64) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000080)={0x0, r10, 0x1f, 0x0, 0x81}) (async) move_mount(r8, &(0x7f00000045c0)='./file3\x00', r9, &(0x7f0000004600)='./file4\x00', 0x60) (async, rerun: 32) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x80001, 0x0) (async, rerun: 32) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:02 executing program 4: r0 = openat$nci(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 11:20:02 executing program 3: r0 = openat$smackfs_netlabel(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fchmod(r0, 0x20) [ 453.209901][T12746] loop1: detected capacity change from 0 to 64 11:20:02 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) sendfile(r1, r0, 0x0, 0xffffffff) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:02 executing program 0: r0 = openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 453.276409][T12752] loop5: detected capacity change from 0 to 64 [ 453.308803][T12752] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 453.339648][T12759] loop2: detected capacity change from 0 to 64 11:20:02 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) 11:20:02 executing program 3: r0 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 11:20:02 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000040)) 11:20:02 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x1000000, &(0x7f0000000080)=ANY=[], 0x1, 0x9d, &(0x7f0000002280)="$eJzs1rGJAkEABdA/GxwXbQMXnBVsD5YiG2pmpAjakK1YwnZgYGqysoxgbrIi7wXzGX7yYZK53M9/aZPxmIy/qcZqu9uvV5t6hq/UJClJpqf/b+v9uqxdefbD7dAPJf2Uc+8FAADe16RL/eqfplyUdN2r/ZlvGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCHeAQAAP//L/walg==") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x2) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x1000000, &(0x7f0000000080)=ANY=[], 0x1, 0x9d, &(0x7f0000002280)="$eJzs1rGJAkEABdA/GxwXbQMXnBVsD5YiG2pmpAjakK1YwnZgYGqysoxgbrIi7wXzGX7yYZK53M9/aZPxmIy/qcZqu9uvV5t6hq/UJClJpqf/b+v9uqxdefbD7dAPJf2Uc+8FAADe16RL/eqfplyUdN2r/ZlvGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCHeAQAAP//L/walg==") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x2) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) [ 453.418751][T12769] loop1: detected capacity change from 0 to 64 11:20:02 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) fstatfs(r0, &(0x7f0000000140)=""/4096) 11:20:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x6ac42, 0xcd) 11:20:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) [ 453.552714][T12779] loop5: detected capacity change from 0 to 64 [ 453.570880][T12779] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 11:20:02 executing program 2: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000002340)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file2\x00'}) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) newfstatat(0xffffffffffffff9c, &(0x7f00000043c0)='./file3\x00', &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$9p_virtio(&(0x7f0000002280), &(0x7f00000022c0)='./file0\x00', &(0x7f0000002300), 0x1310024, &(0x7f0000004480)={'trans=virtio,', {[{@access_uid={'access', 0x3d, r4}}, {@uname={'uname', 0x3d, '##'}}, {@posixacl}, {@nodevmap}, {@aname={'aname', 0x3d, 'posixacl'}}, {@mmap}, {@cache_loose}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r2}}, {@euid_gt}, {@subj_type={'subj_type', 0x3d, 'b\xe9C '}}, {@obj_role={'obj_role', 0x3d, 'cpuacct.stat\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@uid_gt={'uid>', r3}}]}}) (async) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/dev/lonp0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000240)={0x2020}, 0x2020) (async) r6 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r8 = fcntl$dupfd(r5, 0x406, r5) (async) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000004640)=0x4000) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r10 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r9, 0x0, 0x0, 0x110001) (async, rerun: 64) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000080)={0x0, r10, 0x1f, 0x0, 0x81}) (async, rerun: 64) move_mount(r8, &(0x7f00000045c0)='./file3\x00', r9, &(0x7f0000004600)='./file4\x00', 0x60) (async) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x80001, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:02 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) sendfile(r1, r0, 0x0, 0xffffffff) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:02 executing program 0: quotactl$Q_SETQUOTA(0x0, &(0x7f0000000000)=@filename='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 11:20:02 executing program 4: openat$damon_attrs(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x20) 11:20:02 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) renameat2(r0, &(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f0000000200)='./file1\x00', 0x1) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:02 executing program 3: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:20:02 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) [ 453.692049][T12795] loop1: detected capacity change from 0 to 64 11:20:03 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) syncfs(r0) 11:20:03 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async, rerun: 64) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (rerun: 64) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) sendfile(r1, r0, 0x0, 0xffffffff) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 453.762025][T12801] loop2: detected capacity change from 0 to 64 11:20:03 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x48442, 0x0) fchown(r0, 0x0, 0x0) 11:20:03 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, 0x0, 0x0) [ 453.840224][T12809] loop5: detected capacity change from 0 to 64 11:20:03 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x2000, 0x98) 11:20:03 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mount$bind(&(0x7f0000000200)='./bus\x00', &(0x7f0000002280)='./bus\x00', &(0x7f00000022c0), 0x800, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) open(&(0x7f0000002300)='./bus\x00', 0x800, 0x120) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='coredump_filter\x00') r1 = fcntl$dupfd(r0, 0x401, 0xffffffffffffffff) write$smackfs_label(r1, &(0x7f00000002c0)=ANY=[], 0xfffffdef) 11:20:03 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async, rerun: 64) renameat2(r0, &(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f0000000200)='./file1\x00', 0x1) (async, rerun: 64) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:03 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f1c5445a016d3b0c16465762f6c6f6f7030007c06a3aa118f8378ff23211c7f54e0c7b1f5"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:03 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) 11:20:03 executing program 3: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, 0x0) [ 454.028000][T12829] loop2: detected capacity change from 0 to 64 11:20:03 executing program 0: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$FS_IOC_RESVSP(r0, 0x5452, &(0x7f0000000380)) [ 454.070724][T12832] loop1: detected capacity change from 0 to 64 [ 454.092150][T12835] loop5: detected capacity change from 0 to 64 11:20:03 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mount$bind(&(0x7f0000000200)='./bus\x00', &(0x7f0000002280)='./bus\x00', &(0x7f00000022c0), 0x800, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) open(&(0x7f0000002300)='./bus\x00', 0x800, 0x120) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:03 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(r0, 0x0, 0x0) 11:20:03 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f1c5445a016d3b0c16465762f6c6f6f7030007c06a3aa118f8378ff23211c7f54e0c7b1f5"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:03 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) renameat2(r0, &(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f0000000200)='./file1\x00', 0x1) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:03 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') ioctl$FS_IOC_RESVSP(r0, 0xb703, 0x0) 11:20:03 executing program 3: r0 = openat$tun(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = dup(r0) read$smackfs_logging(r1, 0x0, 0x0) [ 454.320864][T12847] loop2: detected capacity change from 0 to 64 [ 454.347576][T12852] loop5: detected capacity change from 0 to 64 [ 454.361982][T12853] loop1: detected capacity change from 0 to 64 [ 454.378868][T12848] I/O error, dev loop2, sector 56 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 [ 454.422399][T12848] Buffer I/O error on dev loop2, logical block 7, lost async page write [ 454.480391][T12847] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=75622f2e) 11:20:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='coredump_filter\x00') r1 = fcntl$dupfd(r0, 0x401, 0xffffffffffffffff) write$smackfs_label(r1, &(0x7f00000002c0)=ANY=[], 0xfffffdef) 11:20:03 executing program 0: r0 = fsopen(&(0x7f0000000100)='virtiofs\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000180)='*^}&\x00', 0x0, r1) read(r0, &(0x7f00000001c0)=""/4096, 0x1000) 11:20:03 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f1c5445a016d3b0c16465762f6c6f6f7030007c06a3aa118f8378ff23211c7f54e0c7b1f5"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:03 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000000)={@id={0x2, 0x0, @a}, 0x10, 0x0, '\x00', @d}) 11:20:03 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x210441, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x5, 0xffffffffffff8000) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) r4 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002380), 0x14000, 0x0) r5 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000022c0), 0x200000, 0x0) fstat(r5, &(0x7f0000002300)) sendfile(r3, r4, &(0x7f0000002280)=0x2, 0x9) 11:20:03 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mount$bind(&(0x7f0000000200)='./bus\x00', &(0x7f0000002280)='./bus\x00', &(0x7f00000022c0), 0x800, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) open(&(0x7f0000002300)='./bus\x00', 0x800, 0x120) (async) open(&(0x7f0000002300)='./bus\x00', 0x800, 0x120) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 454.638033][T12865] loop5: detected capacity change from 0 to 64 11:20:03 executing program 3: openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000480), 0x22000, 0x10a) 11:20:03 executing program 0: r0 = openat$damon_init_regions(0xffffffffffffff9c, &(0x7f0000000180), 0x8202, 0x0) r1 = dup(r0) write$smackfs_load(r1, 0x0, 0x2) [ 454.688473][T12874] loop1: detected capacity change from 0 to 64 [ 454.701549][T12871] loop2: detected capacity change from 0 to 64 [ 454.726975][T12872] I/O error, dev loop2, sector 56 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 11:20:04 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:04 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async, rerun: 64) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x210441, 0x0) (rerun: 64) sendfile(r1, r0, &(0x7f0000000200)=0x5, 0xffffffffffff8000) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async, rerun: 64) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (rerun: 64) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async, rerun: 64) r4 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async, rerun: 64) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002380), 0x14000, 0x0) r5 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000022c0), 0x200000, 0x0) fstat(r5, &(0x7f0000002300)) sendfile(r3, r4, &(0x7f0000002280)=0x2, 0x9) [ 454.805870][T12872] Buffer I/O error on dev loop2, logical block 7, lost async page write 11:20:04 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0xfffffffffffffec5}, './file0\x00'}) 11:20:04 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) [ 454.875020][T12871] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=75622f2e) [ 454.903279][T12887] loop1: detected capacity change from 0 to 64 [ 454.981061][T12891] loop5: detected capacity change from 0 to 64 11:20:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='coredump_filter\x00') r1 = fcntl$dupfd(r0, 0x401, 0xffffffffffffffff) write$smackfs_label(r1, &(0x7f00000002c0)=ANY=[], 0xfffffdef) 11:20:04 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000002280)={{0x1, 0x1, 0x18, r0, {0x100}}, './file1\x00'}) read$FUSE(r3, &(0x7f00000042c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0xfffffffffffffffe, r4}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:04 executing program 3: r0 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000700)={0x10}, 0x10) 11:20:04 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x10000000) 11:20:04 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:04 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x210441, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x5, 0xffffffffffff8000) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) r4 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002380), 0x14000, 0x0) r5 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000022c0), 0x200000, 0x0) fstat(r5, &(0x7f0000002300)) sendfile(r3, r4, &(0x7f0000002280)=0x2, 0x9) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x210441, 0x0) (async) sendfile(r1, r0, &(0x7f0000000200)=0x5, 0xffffffffffff8000) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002380), 0x14000, 0x0) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000022c0), 0x200000, 0x0) (async) fstat(r5, &(0x7f0000002300)) (async) sendfile(r3, r4, &(0x7f0000002280)=0x2, 0x9) (async) 11:20:04 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002340), 0x20001, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 11:20:04 executing program 0: r0 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) read$smackfs_logging(r0, 0x0, 0x0) [ 455.271120][T12903] loop5: detected capacity change from 0 to 64 [ 455.288533][T12904] loop2: detected capacity change from 0 to 64 11:20:04 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 455.321701][T12906] loop1: detected capacity change from 0 to 64 11:20:04 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f00000000c0)='.log\x00', 0x41, 0x0) r1 = dup(r0) write$FUSE_IOCTL(r1, 0x0, 0x0) 11:20:04 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) rename(&(0x7f0000000080)='./file1\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:04 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000002280)={{0x1, 0x1, 0x18, r0, {0x100}}, './file1\x00'}) read$FUSE(r3, &(0x7f00000042c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0xfffffffffffffffe, r4}, 0x10) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 455.489449][T12923] loop1: detected capacity change from 0 to 64 [ 455.554502][T12926] loop2: detected capacity change from 0 to 64 [ 455.574740][T12929] loop5: detected capacity change from 0 to 64 [ 455.594579][T12931] I/O error, dev loop2, sector 56 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 [ 455.632596][T12931] Buffer I/O error on dev loop2, logical block 7, lost async page write 11:20:05 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) write$cgroup_freezer_state(r0, 0x0, 0x0) 11:20:05 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f00000001c0), 0x42, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [], 0xa, "8796b3e45824524fed5a4cee614d7d76d40fccd0e18aa5029a95fd7777b646729ac411a6ba3f4583a2268764d22186f061290991cb9c87a474a3c9a84bd6ad870e4a4bef1dac8daf6ed88ca5da55516dee98513d1c0d"}, 0x61) 11:20:05 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000002280)={{0x1, 0x1, 0x18, r0, {0x100}}, './file1\x00'}) read$FUSE(r3, &(0x7f00000042c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0xfffffffffffffffe, r4}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000002280)={{0x1, 0x1, 0x18, r0, {0x100}}, './file1\x00'}) (async) read$FUSE(r3, &(0x7f00000042c0)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0xfffffffffffffffe, r4}, 0x10) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) 11:20:05 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_STATFS(r0, 0x0, 0x0) 11:20:05 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) sendfile(r0, r2, 0x0, 0xffff) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:05 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) rename(&(0x7f0000000080)='./file1\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:05 executing program 0: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 455.914765][T12937] loop2: detected capacity change from 0 to 64 [ 455.931850][T12941] loop5: detected capacity change from 0 to 64 [ 455.938529][T12940] loop1: detected capacity change from 0 to 64 [ 455.941382][ T27] kauditd_printk_skb: 40 callbacks suppressed 11:20:05 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000180)) 11:20:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x102028, &(0x7f00000004c0)) [ 455.941394][ T27] audit: type=1800 audit(1688296805.140:613): pid=12943 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1953 res=0 errno=0 [ 455.996936][T12943] I/O error, dev loop5, sector 56 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 11:20:05 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) sendfile(r0, r2, 0x0, 0xffff) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) sendfile(r0, r2, 0x0, 0xffff) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) 11:20:05 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x80) rmdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:05 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80801, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 11:20:05 executing program 0: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) [ 456.093028][T12943] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 456.126341][T12941] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=75622f2e) 11:20:05 executing program 3: mount$fuse(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0xf000, 0x0) 11:20:05 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) rename(&(0x7f0000000080)='./file1\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') write$sndseq(r0, &(0x7f0000000000)=[{0x9, 0x2d, 0x30, 0x0, @tick, {}, {}, @raw32}], 0x1c) 11:20:05 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000028c0), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x5451, 0x0) [ 456.225479][T12963] loop2: detected capacity change from 0 to 64 [ 456.227751][T12964] loop1: detected capacity change from 0 to 64 11:20:05 executing program 3: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/126, 0x7e}, {&(0x7f0000000080)=""/43, 0xffffff8b}, {&(0x7f0000001480)=""/140, 0x8c}, {&(0x7f0000000200)=""/208, 0xd0}, {&(0x7f0000000300)=""/128, 0x80}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/123, 0x7b}], 0x7, 0x0, 0x0) 11:20:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000c80)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 11:20:05 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) (async) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x80) (async, rerun: 64) rmdir(&(0x7f0000000200)='./bus\x00') (async, rerun: 64) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:05 executing program 3: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$smackfs_ptrace(r0, 0x0, 0x0) [ 456.384587][ T27] audit: type=1800 audit(1688296805.580:614): pid=12974 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1948 res=0 errno=0 [ 456.408859][T12973] loop5: detected capacity change from 0 to 64 11:20:05 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) sendfile(r0, r2, 0x0, 0xffff) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:05 executing program 0: r0 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) write$damon_init_regions(r0, 0x0, 0x0) 11:20:05 executing program 4: mount$binderfs(&(0x7f0000000280), &(0x7f00000002c0)='./binderfs\x00', 0x0, 0x80000, &(0x7f0000000580)) 11:20:05 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="e12dce812f6c65f62d97b8"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002280)='/sys/class/net', 0x200, 0x1) ioctl$BTRFS_IOC_DEFRAG_RANGE(r2, 0x40309410, &(0x7f0000000200)={0x8000, 0x38cb, 0x2, 0x7fffffff, 0x2, [0x4, 0x10, 0x100, 0x800]}) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:05 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/pid\x00') 11:20:05 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x6000, 0x0) [ 456.513305][ T27] audit: type=1800 audit(1688296805.710:615): pid=12992 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1964 res=0 errno=0 11:20:05 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) (async) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x80) (async) rmdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:05 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x537281, 0x0) 11:20:05 executing program 3: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0xfffffff7, 0x0, 0x0) 11:20:05 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r4, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f00000066c0)={0x50, 0x0, r5, {0x7, 0x21}}, 0x50) fstat(r1, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000002300)={0x90, 0xffffffffffffffda, r5, {0x2, 0x3, 0x8, 0x7, 0x261e931c, 0x9, {0x5, 0xfffffffffffffff9, 0x1000, 0xffff, 0x3f, 0x3ff, 0x0, 0x4, 0x5, 0x4000, 0x5, r2, r6, 0x20, 0x6}}}, 0x90) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:05 executing program 0: r0 = openat$adsp1(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000300)) [ 456.642355][ T27] audit: type=1800 audit(1688296805.810:616): pid=13000 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1959 res=0 errno=0 [ 456.676220][T13011] loop5: detected capacity change from 0 to 64 11:20:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x800c0, 0xc) 11:20:05 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x35) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 456.730747][ T27] audit: type=1800 audit(1688296805.900:617): pid=13013 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1949 res=0 errno=0 11:20:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="001a7d5d6e5b250d4bec08a1b49dc0f56d24e63a79dd198dd381cc0f9f89c941c15cc4486d533df59fb2c7a36721da81fdb502571926"], 0x0, 0x236, &(0x7f0000000300)="$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") r0 = fspick(0xffffffffffffff9c, &(0x7f0000000140)='./mnt\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f00000001c0)='ro\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 11:20:06 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async, rerun: 64) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (rerun: 64) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="e12dce812f6c65f62d97b8"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002280)='/sys/class/net', 0x200, 0x1) ioctl$BTRFS_IOC_DEFRAG_RANGE(r2, 0x40309410, &(0x7f0000000200)={0x8000, 0x38cb, 0x2, 0x7fffffff, 0x2, [0x4, 0x10, 0x100, 0x800]}) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 456.779253][T13021] loop1: detected capacity change from 0 to 64 11:20:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0xbfaa, 0x0) sendfile(r0, r0, 0x0, 0xb000) [ 456.855090][T13024] loop2: detected capacity change from 0 to 64 11:20:06 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r4, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f00000066c0)={0x50, 0x0, r5, {0x7, 0x21}}, 0x50) fstat(r1, &(0x7f0000002280)) (async) fstat(r1, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000002300)={0x90, 0xffffffffffffffda, r5, {0x2, 0x3, 0x8, 0x7, 0x261e931c, 0x9, {0x5, 0xfffffffffffffff9, 0x1000, 0xffff, 0x3f, 0x3ff, 0x0, 0x4, 0x5, 0x4000, 0x5, r2, r6, 0x20, 0x6}}}, 0x90) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:06 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x10000013}) [ 456.912207][ T27] audit: type=1800 audit(1688296806.100:618): pid=13030 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1962 res=0 errno=0 [ 456.921466][T13029] loop3: detected capacity change from 0 to 128 [ 456.950358][T13028] loop5: detected capacity change from 0 to 64 11:20:06 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="e12dce812f6c65f62d97b8"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002280)='/sys/class/net', 0x200, 0x1) ioctl$BTRFS_IOC_DEFRAG_RANGE(r2, 0x40309410, &(0x7f0000000200)={0x8000, 0x38cb, 0x2, 0x7fffffff, 0x2, [0x4, 0x10, 0x100, 0x800]}) (async, rerun: 64) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (rerun: 64) 11:20:06 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x35) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x35) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) [ 457.012084][T13035] loop1: detected capacity change from 0 to 64 [ 457.019301][ T27] audit: type=1800 audit(1688296806.210:619): pid=13036 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file1" dev="sda1" ino=1951 res=0 errno=0 [ 457.094405][T13029] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 457.108475][T13041] loop2: detected capacity change from 0 to 64 [ 457.122753][T13029] ext4 filesystem being mounted at /root/syzkaller-testdir3792690675/syzkaller.U6Bz2a/470/mnt supports timestamps until 2038-01-19 (0x7fffffff) 11:20:06 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x4c6eca4b2d873e48, 0x0) 11:20:06 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/cgroup\x00') [ 457.178859][T13029] EXT4-fs (loop3): re-mounted 76b65be2-f6da-4727-8c75-0525a5b65a09 ro. Quota mode: none. [ 457.195309][ T27] audit: type=1800 audit(1688296806.380:620): pid=13047 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1975 res=0 errno=0 11:20:06 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000200)='./file0/file0\x00', 0x1000000, &(0x7f0000000100)=ANY=[@ANYRES8=0x0], 0x1, 0x94, &(0x7f0000002280)="$eJzs0b2pAlEQBeBzN3nPZBswsINbh23IhpoZKYIV2YolbA+mJiv+IGhqsCLfFwxzJjowx/NhmjYZ9snwZr3ZLher+0ySv/BrmmRekvwnmbW3/Hzz9T557H1J15923XhNAQCATzWpL7mk1tHKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHyhSwAAAP//d9AeYA==") open(&(0x7f0000000040)='./bus\x00', 0x100, 0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000002340)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:06 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r4, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f00000066c0)={0x50, 0x0, r5, {0x7, 0x21}}, 0x50) fstat(r1, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000002300)={0x90, 0xffffffffffffffda, r5, {0x2, 0x3, 0x8, 0x7, 0x261e931c, 0x9, {0x5, 0xfffffffffffffff9, 0x1000, 0xffff, 0x3f, 0x3ff, 0x0, 0x4, 0x5, 0x4000, 0x5, r2, r6, 0x20, 0x6}}}, 0x90) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async) read$FUSE(r4, &(0x7f0000004380)={0x2020}, 0x2020) (async) write$FUSE_INIT(r4, &(0x7f00000066c0)={0x50, 0x0, r5, {0x7, 0x21}}, 0x50) (async) fstat(r1, &(0x7f0000002280)) (async) write$FUSE_ENTRY(r0, &(0x7f0000002300)={0x90, 0xffffffffffffffda, r5, {0x2, 0x3, 0x8, 0x7, 0x261e931c, 0x9, {0x5, 0xfffffffffffffff9, 0x1000, 0xffff, 0x3f, 0x3ff, 0x0, 0x4, 0x5, 0x4000, 0x5, r2, r6, 0x20, 0x6}}}, 0x90) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) 11:20:06 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 11:20:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x24240, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 11:20:06 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x35) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x35) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) [ 457.317567][ T5040] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. 11:20:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x24240, 0x0) [ 457.396686][T13062] loop5: detected capacity change from 0 to 64 [ 457.417787][T13064] loop1: detected capacity change from 0 to 64 11:20:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x24240, 0x100) 11:20:06 executing program 5: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000200)='./file0/file0\x00', 0x1000000, &(0x7f0000000100)=ANY=[@ANYRES8=0x0], 0x1, 0x94, &(0x7f0000002280)="$eJzs0b2pAlEQBeBzN3nPZBswsINbh23IhpoZKYIV2YolbA+mJiv+IGhqsCLfFwxzJjowx/NhmjYZ9snwZr3ZLher+0ySv/BrmmRekvwnmbW3/Hzz9T557H1J15923XhNAQCATzWpL7mk1tHKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHyhSwAAAP//d9AeYA==") (async) open(&(0x7f0000000040)='./bus\x00', 0x100, 0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000002340)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async, rerun: 64) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (rerun: 64) [ 457.427693][ T27] audit: type=1800 audit(1688296806.620:621): pid=13065 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=1967 res=0 errno=0 [ 457.443076][T13068] loop2: detected capacity change from 0 to 64 11:20:06 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa4240, 0x0) link(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00') 11:20:06 executing program 4: openat(0xffffffffffffffff, 0x0, 0xc0b5ce953c98b1e3, 0x0) [ 457.511812][ T27] audit: type=1800 audit(1688296806.660:622): pid=13070 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1974 res=0 errno=0 11:20:06 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1001400, &(0x7f00000003c0)=ANY=[], 0x1, 0xa0, &(0x7f0000005fc0)="$eJzszjGKwlAUBdD7wxSZJhuYYnaQPcxShpQznZUiiAtyKy4hO7CwtYloUihYCaLIOcV/vHf5cLeHzVeaZFglw2Q9zdl88ff7P77hLVVJSpI6yXcz7rufMStT3u+XXV/Sneaz+wIAAPer0l7tJe358HFx+7zxr350MQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAXcQwAAP//6vAhdg==") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000140)={[{@fastboot}, {@quota}, {@noflush_merge}, {@quota}, {@flush_merge}, {@nodiscard}]}, 0x3, 0x5512, &(0x7f0000000a80)="$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") open(&(0x7f0000000a40)='./bus\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) open(&(0x7f00000001c0)='./file1/file0\x00', 0x80, 0x110) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) sendfile(r1, r4, &(0x7f00000022c0)=0x7, 0x8) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200), 0x801, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000002280)={0x4, 0x4, 0x2, 0x7, 0x5}) 11:20:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) sendfile(r1, r0, 0x0, 0x7ffffffd) ftruncate(r2, 0x0) 11:20:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x24240, 0x0) openat(0xffffffffffffff9c, &(0x7f0000001240)='./file0\x00', 0x100, 0x19) 11:20:06 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002400)={0x2020}, 0x2020) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000002280)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x90, 0x400, 0x8, 0x3ff, 0x4c02, 0xfffffffffffffff8}, {0xc8d, 0x6, 0x9462, 0x40, 0x2, 0xffffffff}], ['\x00', '\x00', '\x00']}) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000200)={0x0, 0x3, 0x9177, 0x7fffffff}) 11:20:06 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa4240, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x100) [ 457.620224][T13091] loop5: detected capacity change from 0 to 64 11:20:06 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000200)='./file0/file0\x00', 0x1000000, &(0x7f0000000100)=ANY=[@ANYRES8=0x0], 0x1, 0x94, &(0x7f0000002280)="$eJzs0b2pAlEQBeBzN3nPZBswsINbh23IhpoZKYIV2YolbA+mJiv+IGhqsCLfFwxzJjowx/NhmjYZ9snwZr3ZLher+0ySv/BrmmRekvwnmbW3/Hzz9T557H1J15923XhNAQCATzWpL7mk1tHKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHyhSwAAAP//d9AeYA==") (async) r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000200)='./file0/file0\x00', 0x1000000, &(0x7f0000000100)=ANY=[@ANYRES8=0x0], 0x1, 0x94, &(0x7f0000002280)="$eJzs0b2pAlEQBeBzN3nPZBswsINbh23IhpoZKYIV2YolbA+mJiv+IGhqsCLfFwxzJjowx/NhmjYZ9snwZr3ZLher+0ySv/BrmmRekvwnmbW3/Hzz9T557H1J15923XhNAQCATzWpL7mk1tHKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHyhSwAAAP//d9AeYA==") open(&(0x7f0000000040)='./bus\x00', 0x100, 0x20) (async) open(&(0x7f0000000040)='./bus\x00', 0x100, 0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000002340)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x24242, 0x0) 11:20:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="598c632b5672b5f5d684f7ae5f4cc171f4c31e58ff5fdda23bc21599e05567fb043bd18fdbbfadda6b70f47f37b9aead397f99c116d34552bff859d0ac1017ab669b2fdbbaebc9461bd70c8c4edab99f349307d4dce12d30979759cfbad346513c57ca2a9d7ef902f754f87334fa68a223cd26876e64dbd59fe072c2c2daf4bebab1718e5faaf1c0f98debb634e7daba53add045a1d81559e4bb17a5dba75fe7f49fb5ad6d6a7be1862c7285711cf66b99a5f8ff57c728801208c91bbd0e62cf89be985a128b55e0644bcd3a8c221e39d7178d29ce39f3aaae59b0b3aa3c3db82f9add9dfb992ec391532b450834de50f183c5810a972b9cf227c5d61435d75a3fd0736ac9b2b46b3295faaa08b0740958aa5f96963884d7552c7be4fd2e0dadc010ab536ab126b11d27eea4e516e32db0dd39c55a5c8a159523aa026c5c02f308d42b69bcf555f9e8a185bdd2286e0c4adfc708bd93dcb2c33c6aa1dcfeaece0b2d046254ed325595108c2c39f1f8883f68030730021077ccf7c5f4509237284910ad7f93824e99e01ce106e5bd729be153b4b6bc1fbfb1bece9c48ac49d157d800e3940b77e3f9c70baa42791d60181d925c1412e44696e833547076bae516f3602e5fc07b0be9785342ceee6d9486777f796d834c17d18b8ba8353b83dfc473fece90bba7f3749ee30f2c768b7bb1b82c893656c3b95e8dea4cd36a72257a9d8c96fc90aff24149d3eae8f051a6283b98ebe353f417bd67dd38705d959846a622e152a999d6dd8686c95a4c9edab92de9a9af041b1bd1c8c80a7fdbf274f5ed32959824152810594d79bc690739ed04d9248cc6240e1ecf54f7843bc591c899ad0b1e7b7388b336bbeac9ee9e6fa392298503c232906e18aaa96c82a0edfdc311f8dfc7dedc7ce7c177fcadfe3f70a8e3d1c353d8d40d9139ec8e17fc69d936102e6fa28666db89cb5aeb2365e906ebe0d4c07539a77b9120da6415c06f9d6fe7bdf9930ce63eeae1a7896bde5d08e41ae89cc49c50abc9ea1504a9e22b4f38e80dd917740d105f7642dc1c153d337144446f69d100d72fb588ead3d67370506edaf6a1d2a43f8a0070bef061debf20958beec3b82f054913eea8f7532030e7d3f2fe6fa8d47c083418c4927bcf6f5d334baf8b9d438437373a74968a560a530b87a54832deac24f40e13b4b9426578b2b3a03050b11a371f238ef1416278bd7743ed3e7b8f41b3cafeff35b0ceea73f844a256ff4adedfb19fe7f8fc4b2fb33d7cf0b5e8e3ae95074e8e8366ce9ddafcd6523b52f372a092c3e459b0f24845d34c8eb9a8d1bdae16f7beb78608b3b9fe18ec027f382a17f36d37e9d134f433ef4329aea78f3c8b1d4d14560d48af0672efedfca383b335afd6f71ba307a61991997b1f123530c7abf0fac11c7d0ca2ec9fcaf8d726ccdffbbfee26ee6d163355d850e64dcac8e3daf7020834ee9003ad83ecdae8688d73df70e678d578d21f4ef54c69cfa2a8588ce1dd158bd997af6041764b867a6008b1695347723f436e2bc406577e11e1684663b1ff113b0e37dc41de6801906c9771c77985da34e0f10faf434f2391fbee210814e0986a9d10a95b96e15638f61eeb3a5b95cdf6750c544aee3b2cddd165a80cec85d3b679195ded810bd1baac769f872a81f75bbbcf7095fa6764624cbf194e2ceb929ef621696013b2c8c6a112a69b3284484ea261c41c945f8b326fe501bc5cd65975c71db8f3055c3e15a7e7358acfb5440a0bc0fe51b6cbd8206b74adac83f65b14af8aea55ec53f41fc669b43908f72bf5b41cd15b42515fb2af9739e6e2540ff458f708154e898ec85ce9be3f0cc277d25d78c0a716f8c126526f1b68dbc5d6dd5cec07ebb9e8ba7b6b936e908bbf41db1280bd3958ea5897d9d64a8e866984a5b187b29b2ed758564197f131378773828c7d11d3e2b00d411b6c082fb7da649954767dfd73fc7f28db0fddc9ff6700c8517103a7cb3fb6d3412a37b0cdd7643d53a85804d68b7fb11408a01ca277dbdd0984a00235b4ea7edea085b33be4c45dd46e8310c54a197f996ce3a83f6e4d0b5c6e64579f8e41097a6b10a5d0e25333c29aa6677394aa6a112185e9b458218828049aa9a9ed3fedabaf36c40e3683e1e50896518d09be4ac0fd37910534e8a359", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) sendfile(r1, r0, 0x0, 0x7ffffffd) ftruncate(r2, 0x0) 11:20:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xe4240, 0x124) [ 457.733893][T13101] loop1: detected capacity change from 0 to 64 [ 457.764752][T13106] loop2: detected capacity change from 0 to 64 11:20:07 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002400)={0x2020}, 0x2020) (async) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async, rerun: 64) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async, rerun: 64) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) (async) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000002280)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x90, 0x400, 0x8, 0x3ff, 0x4c02, 0xfffffffffffffff8}, {0xc8d, 0x6, 0x9462, 0x40, 0x2, 0xffffffff}], ['\x00', '\x00', '\x00']}) fallocate(r1, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) (async) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000200)={0x0, 0x3, 0x9177, 0x7fffffff}) 11:20:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xe4640, 0x0) 11:20:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc42c0, 0x0) [ 457.889945][T13112] loop5: detected capacity change from 0 to 64 [ 458.030342][T13124] loop2: detected capacity change from 0 to 64 11:20:07 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1001400, &(0x7f00000003c0)=ANY=[], 0x1, 0xa0, &(0x7f0000005fc0)="$eJzszjGKwlAUBdD7wxSZJhuYYnaQPcxShpQznZUiiAtyKy4hO7CwtYloUihYCaLIOcV/vHf5cLeHzVeaZFglw2Q9zdl88ff7P77hLVVJSpI6yXcz7rufMStT3u+XXV/Sneaz+wIAAPer0l7tJe358HFx+7zxr350MQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAXcQwAAP//6vAhdg==") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000140)={[{@fastboot}, {@quota}, {@noflush_merge}, {@quota}, {@flush_merge}, {@nodiscard}]}, 0x3, 0x5512, &(0x7f0000000a80)="$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") (async) open(&(0x7f0000000a40)='./bus\x00', 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 32) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (rerun: 32) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) open(&(0x7f00000001c0)='./file1/file0\x00', 0x80, 0x110) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async, rerun: 64) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (rerun: 64) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) fallocate(r3, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) (async, rerun: 32) sendfile(r1, r4, &(0x7f00000022c0)=0x7, 0x8) (async, rerun: 32) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200), 0x801, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000002280)={0x4, 0x4, 0x2, 0x7, 0x5}) 11:20:07 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000080)='./file0\x00', 0xce200, 0xa) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:07 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000cc0)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x440, 0x0) 11:20:07 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x941, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x80, &(0x7f00000000c0)) 11:20:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa4240, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 11:20:07 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async, rerun: 64) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002400)={0x2020}, 0x2020) (async) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async, rerun: 64) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (rerun: 64) fallocate(r4, 0x0, 0x0, 0x2000c02) (async, rerun: 64) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) (async, rerun: 64) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000002280)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x90, 0x400, 0x8, 0x3ff, 0x4c02, 0xfffffffffffffff8}, {0xc8d, 0x6, 0x9462, 0x40, 0x2, 0xffffffff}], ['\x00', '\x00', '\x00']}) fallocate(r1, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) (async) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000200)={0x0, 0x3, 0x9177, 0x7fffffff}) 11:20:07 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa0240, 0x0) [ 458.672992][T13139] loop2: detected capacity change from 0 to 64 [ 458.680497][T13136] loop5: detected capacity change from 0 to 64 11:20:07 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x28c040, 0xa4) 11:20:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x64240, 0x142) 11:20:08 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000080)='./file0\x00', 0xce200, 0xa) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:08 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200), 0x204000, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000002280)={0x4, 0x1, {0x80, @struct={0x542, 0x9}, 0x0, 0x2, 0x81, 0x6, 0x1, 0x4, 0x4, @struct={0xfffff800, 0x4}, 0x9, 0x81, [0x5, 0x8, 0x0, 0x6411, 0x400, 0x8]}, {0x6, @struct={0x8000, 0x101}, 0x0, 0x3, 0x4, 0xfffffffffffffff8, 0x0, 0xfffffffffffffffb, 0xa, @struct={0x6, 0x8}, 0x8001, 0x3f, [0x8000, 0x10000, 0x2, 0x400, 0x2, 0x5]}, {0x7fffffff, @struct={0x1, 0x8}, 0x0, 0x3, 0x3, 0xfffffffffffffffa, 0x7ff, 0x7fff, 0x404, @usage=0x20, 0x80, 0x200, [0x3, 0x8, 0x0, 0xf94, 0x4e3, 0x2]}, {0x7fff, 0x1}}) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:08 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000cc0)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x440, 0x10) [ 459.148524][T13155] loop2: detected capacity change from 0 to 64 11:20:08 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1001400, &(0x7f00000003c0)=ANY=[], 0x1, 0xa0, &(0x7f0000005fc0)="$eJzszjGKwlAUBdD7wxSZJhuYYnaQPcxShpQznZUiiAtyKy4hO7CwtYloUihYCaLIOcV/vHf5cLeHzVeaZFglw2Q9zdl88ff7P77hLVVJSpI6yXcz7rufMStT3u+XXV/Sneaz+wIAAPer0l7tJe358HFx+7zxr350MQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAXcQwAAP//6vAhdg==") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000140)={[{@fastboot}, {@quota}, {@noflush_merge}, {@quota}, {@flush_merge}, {@nodiscard}]}, 0x3, 0x5512, &(0x7f0000000a80)="$eJzs3EtvG1UbB/AzTtP72zdCLNh1pAopkWqrzqWCXYBWXESqiMuCFTj2xHJre6LYcUJWLFgiFnwTBBIrlnwGFqzZIRYgdkggz5lAQ7lVcWKa/H7S+D9zPH7mzMiK9MxEDsCZNZf+9EMSroVLIYSZEMLVJBTrSbkUVmM8E0K4HkKoPLQk5fhvA+dDCJdDCNfGxWPNpHzrk5ujGyvfv/bjl19fOHfl0y++md5ZA9P2bAihtxXXd3sx83bM++V4Y9Qpsrc8KjO+0XtQbucxd7ONosJu42C/RpFL7bh/vrUzGOdmt9EcZ7uzWYxv9eMBB6P2QZ3iA/cb28V2K9sosjPIi2zvx3nt7ce/bfuDYazTKuu9X5QPw+FBxvFsL4vns/WgyGZ/WI7Hunkr2xvnqMzycKGZd1vFPDaOcqX/217v9Hf20lG2Pejk/XSlVn+uVr9drW/nrWyYLVcbvdbt5XS+3R3vVh1mjd5qO8/b3azWzHsL6Xy72azW6+n8nWyj0+in9XptqXarurJQrt1MX773dtptpfPjfLHT3xl2uoN0M99O4ycW0sXa0vML6Y16+ubaerr+xt27a+tvvXvnnXsvrL36UrnTI9NK5xdvLS5W67eqi/WFM3T+H5aTfozzT452eeDv+YIBPLZH+v+g/weO35Pe/4dJ9v/jlkr//8/9b0X/f9rOH45E/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcGZ9O/vZK8XKXNy+Uo7/rxx6qtxOQgiVEMIvf2ImnD9Uc6asM/sX+8/+YQ5fJaGoMD7GhXK5HEJYLZef/3/cVwEAAABOr88/uP5x7Nbjy9y0J8RJijdtKlffm1C9JIQwO/fdhKpVxi9PT6hY8f0+F/YmVK24gXVxQsXiLbdzk6r2r8wciosPRRKjcqLTAQAATsThTuBkuxAAAABO0kfTngDTkYSDR5kHz4KL/7z//YHgpUNbAAAAwBMomfYEAAAAgGNX9P9+/w8AAABOt/j7fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPArO/dzmzgQxQH42WBg/2nRau/byt6gjJSQY44JBaQJSiAtpAFqILeUEEGEx0JxBFIkxrGCvk/yDGOj34wRlzeWDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdOmpWs0fbv/dn5uz3Z0nz90AAAAAx2yq1bz+ME3jH835X82pP824iIgyIo7V7oMYtTIHTU514vvVuzU8RtQJ+znGzfE9Iv43x8vvrn8FAAAAuFzrxXKWqvXUTPteEJ8pbdqUP68y5RURUU2fM6WV++ZvprD6/z2Mm0xp9QbWJFNY2nIbHr82yjVJ26DVTd50RerKbuYFAAD61K4ETlQhAAAAXIDrvhdAP4pDc3jOOE5d80DwW2sEAAAAfEFF3wsAAAAAOlfX/97/BwAAAJctvf8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACALm2q1Xy9WM5OXb/7YM52d558dwQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAr+zPOwqEQBiEwd71ncnc/7DSoKGxSRUIH39jMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADw5nd/+T8xNc4kc6+NpeeRZO3U2Do19s6Noz+Mr18DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwsT8vKRACQRAFc8b/Tvr+h5UEPYMIEdDwqKIWDQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHzR7375PzE1ziRzp42l45Fk7aqxddXYe9A4ejDe/g0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwsXP/vHGTYQDAH9vn6x9AhIAyBFCRGGCh6bW0dGUARQx8BKQovZTAlT9tBlpFSFnYUOYuCEaEkEBh63fo3EhdytbhhiAxg+yzU7cNcECxj+b3k16/zzmW3+f1naI8fp0DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA2fjNeSKs4KzZzk7jed2tvc7Xodx/oCze2by8WrYiTlvP+H3ix+eLEQneJAAAAcHhkdX0fEXfyneWiT+fK+j+vjylq/q+fmsR1Pf9g3b+7t3m0+tFiXf//9OPd5/YHmpuMU5x0bX00PPVwKr3/aIoz7+m/PKJXXvny3ktWviHpO1vPjvPyeiZf3rz5Vr8Mj7SRLQDwT5ys+yqo/x4q+kGXiQFwaPQahXdd/2dz3eYEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0IbxVjxRx0lELPbuxYXdvc3Vg/ob27cX63bu+vXt5jmLU+QRsbY+Gp5qcS6z7srVax+ujEbDy+0HJyKiu9Gr4L0pjon482Oqj2d0N4s/DpLZSKPTIK3en1nJ51EG9Wfv0Z+5o19IAAA8tvKqFXX9nXxnudiXzEf89s399f8rjTimrP/vvn/uVnOsZv0/aG2Gs29p49InS1euXntt/dLKxeHF4Uevnx68MThz/uzZ80vlvZKltUjdMQEAAOBf6FetWf+n8w+v/x9vxDFl/f/pV4PPm2Nl6v8D3Vv06zoTAACAw+2Zl379JTlgf9Lvx2crGxuXB5Pt/uvTk20Hqf5tR6rWrP+z+a6zAgAAANow3kruW/+/0IhjyvX/J799/vvmObOIOFat/59c/Xh0ob3pzLQ2/lG5HKjf9UwBAADoyrGqNdf/8/L5/3T/kYc0Il59eRLX33U1Tf2fvf3Fd82xms//n2lvijMpXZhcj7JfiOgtdJ0RAAAAj7OjVSuK/Z/zneUPfjj+bt/z/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABt+z0AAP//+kQ2AA==") open(&(0x7f0000000a40)='./bus\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) (async) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) open(&(0x7f00000001c0)='./file1/file0\x00', 0x80, 0x110) (async) open(&(0x7f00000001c0)='./file1/file0\x00', 0x80, 0x110) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) (async) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x1f, 0x0, 0x81}) sendfile(r1, r4, &(0x7f00000022c0)=0x7, 0x8) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200), 0x801, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000002280)={0x4, 0x4, 0x2, 0x7, 0x5}) 11:20:08 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x941, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0x0, &(0x7f00000000c0)) 11:20:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x113) 11:20:08 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000080)='./file0\x00', 0xce200, 0xa) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000080)='./file0\x00', 0xce200, 0xa) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) 11:20:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x828c0, 0x4) [ 459.238680][T13158] loop1: detected capacity change from 0 to 64 11:20:08 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x941, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2481, 0x60) 11:20:08 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200), 0x204000, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000002280)={0x4, 0x1, {0x80, @struct={0x542, 0x9}, 0x0, 0x2, 0x81, 0x6, 0x1, 0x4, 0x4, @struct={0xfffff800, 0x4}, 0x9, 0x81, [0x5, 0x8, 0x0, 0x6411, 0x400, 0x8]}, {0x6, @struct={0x8000, 0x101}, 0x0, 0x3, 0x4, 0xfffffffffffffff8, 0x0, 0xfffffffffffffffb, 0xa, @struct={0x6, 0x8}, 0x8001, 0x3f, [0x8000, 0x10000, 0x2, 0x400, 0x2, 0x5]}, {0x7fffffff, @struct={0x1, 0x8}, 0x0, 0x3, 0x3, 0xfffffffffffffffa, 0x7ff, 0x7fff, 0x404, @usage=0x20, 0x80, 0x200, [0x3, 0x8, 0x0, 0xf94, 0x4e3, 0x2]}, {0x7fff, 0x1}}) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200), 0x204000, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000002280)={0x4, 0x1, {0x80, @struct={0x542, 0x9}, 0x0, 0x2, 0x81, 0x6, 0x1, 0x4, 0x4, @struct={0xfffff800, 0x4}, 0x9, 0x81, [0x5, 0x8, 0x0, 0x6411, 0x400, 0x8]}, {0x6, @struct={0x8000, 0x101}, 0x0, 0x3, 0x4, 0xfffffffffffffff8, 0x0, 0xfffffffffffffffb, 0xa, @struct={0x6, 0x8}, 0x8001, 0x3f, [0x8000, 0x10000, 0x2, 0x400, 0x2, 0x5]}, {0x7fffffff, @struct={0x1, 0x8}, 0x0, 0x3, 0x3, 0xfffffffffffffffa, 0x7ff, 0x7fff, 0x404, @usage=0x20, 0x80, 0x200, [0x3, 0x8, 0x0, 0xf94, 0x4e3, 0x2]}, {0x7fff, 0x1}}) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) 11:20:08 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x941, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) [ 459.350392][T13169] loop5: detected capacity change from 0 to 64 [ 459.380842][T13173] loop1: detected capacity change from 0 to 64 11:20:08 executing program 3: epoll_create1(0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/user\x00') 11:20:08 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x4240, 0x0) [ 459.460081][T13183] loop2: detected capacity change from 0 to 64 11:20:08 executing program 4: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) fstat(r0, &(0x7f0000000040)) 11:20:08 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x1002000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:08 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x4000, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000002280), 0x90000, 0x80) ftruncate(r2, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:08 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 11:20:08 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000001b40), 0x40dfc3, 0x0) 11:20:08 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x240081, 0x0) read$FUSE(r0, 0x0, 0x0) 11:20:09 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200), 0x204000, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000002280)={0x4, 0x1, {0x80, @struct={0x542, 0x9}, 0x0, 0x2, 0x81, 0x6, 0x1, 0x4, 0x4, @struct={0xfffff800, 0x4}, 0x9, 0x81, [0x5, 0x8, 0x0, 0x6411, 0x400, 0x8]}, {0x6, @struct={0x8000, 0x101}, 0x0, 0x3, 0x4, 0xfffffffffffffff8, 0x0, 0xfffffffffffffffb, 0xa, @struct={0x6, 0x8}, 0x8001, 0x3f, [0x8000, 0x10000, 0x2, 0x400, 0x2, 0x5]}, {0x7fffffff, @struct={0x1, 0x8}, 0x0, 0x3, 0x3, 0xfffffffffffffffa, 0x7ff, 0x7fff, 0x404, @usage=0x20, 0x80, 0x200, [0x3, 0x8, 0x0, 0xf94, 0x4e3, 0x2]}, {0x7fff, 0x1}}) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 459.818538][T13204] loop5: detected capacity change from 0 to 64 11:20:09 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x20ac0, 0x0) 11:20:09 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x1002000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:09 executing program 4: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x56}, 0x0, 0x0, 0x0) 11:20:09 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20c000, 0x0) [ 459.935244][T13212] loop1: detected capacity change from 0 to 64 [ 460.030839][T13214] loop2: detected capacity change from 0 to 64 11:20:09 executing program 3: clock_gettime(0xe7c8beaad4c4bcc8, 0x0) 11:20:09 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x4000, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000002280), 0x90000, 0x80) ftruncate(r2, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x4000, 0x0) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000002280), 0x90000, 0x80) (async) ftruncate(r2, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) [ 460.079813][T13220] loop5: detected capacity change from 0 to 64 [ 460.114276][T13215] I/O error, dev loop2, sector 56 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 11:20:09 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x6}, &(0x7f00000000c0)={0x7}, 0x0, 0x0) 11:20:09 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x1002000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (rerun: 64) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async, rerun: 64) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (rerun: 64) 11:20:09 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) [ 460.180826][T13215] Buffer I/O error on dev loop2, logical block 7, lost async page write [ 460.200591][T13214] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=75622f2e) 11:20:09 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000002280)={0x2020}, 0x2020) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) open(&(0x7f00000042c0)='./file0\x00', 0x440000, 0x150) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:09 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x5421, &(0x7f0000000040)) 11:20:09 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000023c0), 0x121440, 0x0) 11:20:09 executing program 4: syz_io_uring_setup(0x5a7, &(0x7f0000000180)={0x0, 0x9e85, 0x8}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) [ 460.318416][T13235] loop5: detected capacity change from 0 to 64 [ 460.346758][T13236] loop1: detected capacity change from 0 to 64 [ 460.362600][ T5254] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 460.408901][T13242] loop2: detected capacity change from 0 to 64 11:20:09 executing program 3: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000880), 0x82, 0x0) 11:20:09 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x6880a2, 0x0) 11:20:09 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x80) rmdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:09 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x4000, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r2 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000002280), 0x90000, 0x80) ftruncate(r2, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:09 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000002280)={0x2020}, 0x2020) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) open(&(0x7f00000042c0)='./file0\x00', 0x440000, 0x150) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:09 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280)='bpf\x00', 0x4001, &(0x7f00000022c0)='\x00') write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:09 executing program 3: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) epoll_pwait2(r0, &(0x7f0000000200)=[{}, {}], 0x2, &(0x7f0000002280)={0x0, 0x989680}, &(0x7f00000022c0)={[0x200]}, 0x8) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f00000066c0)={0x50, 0x0, r4, {0x7, 0x21}}, 0x50) read$FUSE(r3, &(0x7f000000a9c0)={0x2020}, 0x2020) read$FUSE(r3, &(0x7f0000006740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000000)={0x10, 0xffffffffffffffda, r5}, 0x10) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r3, &(0x7f00000002c0)={0x90, 0x0, r6}, 0x90) stat(&(0x7f0000002340)='./file1/file0\x00', &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000002400)={0x78, 0x0, r6, {0x16af, 0x0, 0x0, {0x2, 0x7, 0x6, 0x4, 0x8, 0x5, 0x9, 0x1f, 0x8, 0xc000, 0xabd1, r7, r2, 0x5, 0x39}}}, 0x78) r8 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r8, &(0x7f0000000040)=ANY=[], 0x208e24b) r9 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000002300), 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r9, 0x72421000) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:09 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40106e8c, 0x0) [ 460.661292][T13258] loop4: detected capacity change from 0 to 64 [ 460.753634][T13261] loop2: detected capacity change from 0 to 64 [ 460.781517][T13269] loop5: detected capacity change from 0 to 64 [ 460.788929][T13265] loop3: detected capacity change from 0 to 64 11:20:10 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRES8=r2], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:10 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000002280)={0x2020}, 0x2020) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) open(&(0x7f00000042c0)='./file0\x00', 0x440000, 0x150) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:10 executing program 3: ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 460.894985][T13271] loop0: detected capacity change from 0 to 2048 11:20:10 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280)='bpf\x00', 0x4001, &(0x7f00000022c0)='\x00') write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) mount(&(0x7f0000000080)=@sr0, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280)='bpf\x00', 0x4001, &(0x7f00000022c0)='\x00') (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) [ 460.968008][T13275] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:20:10 executing program 0: syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200810, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYBLOB="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"], 0x4, 0x4da, &(0x7f0000000f00)="$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") quotactl$Q_QUOTAOFF(0x0, &(0x7f0000000100)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) [ 461.032968][T13277] loop4: detected capacity change from 0 to 64 [ 461.056129][ T5254] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 461.065431][T13280] loop3: detected capacity change from 0 to 64 [ 461.076435][T13281] loop5: detected capacity change from 0 to 64 [ 461.159707][ T27] kauditd_printk_skb: 26 callbacks suppressed [ 461.159722][ T27] audit: type=1800 audit(1688296810.350:649): pid=13284 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1975 res=0 errno=0 [ 461.160067][T13283] loop2: detected capacity change from 0 to 64 [ 461.204234][ T27] audit: type=1804 audit(1688296810.400:650): pid=13290 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1045305928/syzkaller.s1V3D5/415/file0/file0" dev="loop4" ino=4 res=1 errno=0 11:20:10 executing program 3: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002300)=ANY=[@ANYBLOB="2f6465762f6c6f6f7030009625c59c3a5c2d86335c44e429449ce12df8a86aebca40d1d2da28de3272763a7707906854d157994374698f1a00b87fb82655eb82763a51cf1c249e33c19df38608d28d7936de7b9222a2d7af2804204a6ac8ba34107ceafa6f7a311090b3eb70"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r3 = dup(r0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002280), 0x399800, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000022c0)={0x10002008}) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r5 = fsopen(&(0x7f0000000080)='affs\x00', 0x1) open(&(0x7f0000002380)='./file0\x00', 0x0, 0xb6) ioctl$BTRFS_IOC_QGROUP_LIMIT(r5, 0x8030942b, &(0x7f0000000200)={0x1, {0x0, 0x4, 0x7, 0x4, 0x1}}) fallocate(r1, 0x69, 0x7fffffff, 0x100000000) 11:20:10 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRES8=r2], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 461.438401][T13295] loop0: detected capacity change from 0 to 512 [ 461.451784][T13298] loop3: detected capacity change from 0 to 64 [ 461.466152][T13299] loop4: detected capacity change from 0 to 64 [ 461.521321][T13283] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=75622f2e) [ 461.573341][T13295] EXT4-fs (loop0): Magic mismatch, very weird! [ 461.609161][ T27] audit: type=1804 audit(1688296810.800:651): pid=13299 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1045305928/syzkaller.s1V3D5/416/file0/file0" dev="loop4" ino=4 res=1 errno=0 11:20:11 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:11 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280)='bpf\x00', 0x4001, &(0x7f00000022c0)='\x00') write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) mount(&(0x7f0000000080)=@sr0, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280)='bpf\x00', 0x4001, &(0x7f00000022c0)='\x00') (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) 11:20:11 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f00000022c0)={0x6, 0x8, '\x00', 0x0, &(0x7f0000002280)=[0x0]}) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:11 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './bus\x00'}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000140)) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:11 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRES8=r2], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:11 executing program 0: syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200810, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYBLOB="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"], 0x4, 0x4da, &(0x7f0000000f00)="$eJzs3U1vU9kZAODXzpcJgQTKoq3aQiktrRBOYiBCLFq6qqoKqSrLVoI0MVEUO45ih5KURfgPlYrUVbvsD5g1q9nPZjSzmw2zGGk+ohkRpFl45OubYEKcZMiHUfw80tW951z7vufEuufEb5R7AuhaFyJiNSL6I+J+RAyn9Zl0i9vNrfG6F2uPp9bXHk9lol6/+2UmOd+oi5b3NJxMr5mLiL/8IeLvmTfjVpdX5iZLpeJiWh6tlRdGq8srV2fLkzPFmeJ8oTAxPjF289qNwoH19Xy5Pz366fMPVn/zz0azhtKa1n4cpGbX+zbjNPRGxJ8OI1gH9KT96e90Q3gr2Yg4GxEXk/t/OHqSTxMAOM7q9eGoD7eWAYDjLpvkwDLZfJoLGIpsNp9v5vDOxWC2VKnWrjyoLM1PN3NlI9GXfTBbKo6lucKR6Ms0yuPJ8atyYUv5WkSciYh/DZxIyvmpSmm6k7/4AEAXO7ll/v9moDn/AwDHXK7TDQAAjpz5HwC6j/kfALqP+R8Auo/5HwC6j/kfALqP+R8Ausqf79xpbPX19PnX0w+Xl+YqD69OF6tz+fLSVH6qsriQn6lUZpJn9pR3u16pUlkYvx5Lj0Z+u1CtjVaXV+6VK0vztXvJc73vFfuOpFcAwE7OnH/2cSYiVm+dSLZoWcvBXA3HW7bTDQA6pqfTDQA6xmpf0L328R1fegCOiW2W6H1NLiJObK2s1+v1w2sScMgu/0j+H7qV/D90L/l/6F7y/9C96vXMXtf8j72+EAB4t8nxA23+/n823f8/fUTI36a3vuLpYbYKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3m0b6//m07XAhyKbzecjTkXESPRlHsyWimMRcToiPhroG2iUxzvcZgBgv7KfZdL1vy4PXxraerY/83Ig2UfEP/5z99+PJmu1xQ8b9V9t1teepvWFTrQfANjNxjyd7Fu+yL9Yezy1sR1lez7/fUTkmvHX1/pjfTN+b/Qm+1z0RcTg15m03JRpyV3sx+qTiPjhdv3PxFCSA2mufLo1fiP2qSONn30tfjY519w3fhY/OIC2QLd51hh/bm93/2XjQrLf/v7PJSPU/qXjX+NSU+vJGPgq/sb419Nm/Luw1xjX3/9j23NPIn7cG7ERe71l/NmIn2kT/9Ie43/yk59dbHeu/t+Iy7F9/NZYo7Xywmh1eeXqbHlypjhTnC8UJsYnxm5eu1EYTXLUoxuZ6jd9cevK6Z36P9gmfm6X/v9yj/3/37f3//rzHeL/+hfbxc/GuR3iN+bEX+0x/uTge7l25xrxp9v0f7fP/8oe4z//dOWNZcMBgM6pLq/MTZZKxUUHDhzs5+B3RxWrP77Xu+r1t4rVbsQ4iKwb8C7YvOkj4mWnGwMAAAAAAAAAAAAAAGzrKP5jqdN9BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4Pj6LgAA//99HNWY") quotactl$Q_QUOTAOFF(0x0, &(0x7f0000000100)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) [ 461.886465][T13306] loop2: detected capacity change from 0 to 64 [ 461.911425][T13308] loop4: detected capacity change from 0 to 64 [ 461.924912][T13309] loop5: detected capacity change from 0 to 64 [ 461.957693][T13310] loop3: detected capacity change from 0 to 64 [ 461.999415][T13312] loop0: detected capacity change from 0 to 512 11:20:11 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRES8=r2], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 462.045043][ T27] audit: type=1804 audit(1688296811.240:652): pid=13308 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1045305928/syzkaller.s1V3D5/417/file0/file0" dev="loop4" ino=4 res=1 errno=0 11:20:11 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './bus\x00'}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000140)) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:11 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:11 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f00000022c0)={0x6, 0x8, '\x00', 0x0, &(0x7f0000002280)=[0x0]}) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 462.154167][T13312] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 462.205028][T13327] loop1: detected capacity change from 0 to 64 [ 462.216887][T13312] ext4 filesystem being mounted at /root/syzkaller-testdir2403862440/syzkaller.19u26m/467/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 462.248656][T13329] loop4: detected capacity change from 0 to 64 11:20:11 executing program 0: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000200)='./file1\x00', 0x28100, 0x14) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) r3 = open(&(0x7f0000002380)='./file0/file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000001840)={0x0, ""/256, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000100)='.\x00', 0x1a404ac, &(0x7f00000037c0)=ANY=[@ANYRESHEX, @ANYRESDEC, @ANYRES32, @ANYRESDEC=r4, @ANYRESOCT, @ANYRES16, @ANYBLOB="6c625ae87ec6a2b70738c0c29ef3cb487e1fd790611d1b8aff2aa44fe4bdd1933c0b355ebb53e275cccbfc1e731e2525b40a8e2fba9645616f66af80df6dc5df9aee179174b198d1aee692c07e9892b5e21da6d0b323efd061b70b43aa92fccf24bf926e9c2d161453aee64757e6e2d26de0788d19a4f06547797cfc1473954c3d7ecba45f3b4e908619a10a2f92f46e7e8993c33ee806e29434480b7557bee774c8f92a750a9cf4c89a767858e703cab5860bdd49445d2e33730adb6a52e0788aa24b4267b417d2585022d6a6fb000000000000cba3486c8df5cbf437d2ed221cd56c10f6b888f9a6225266558fabf1a3f8831032a915a1ebc0a0c64e6c8bb03dcd554b4afe69d67f18ab70ff915dfa55d0c96080c219fc57e78f64c2e7dc05907dd18f7a64f18665eff69f98ebea8e6a51c913bdd2c5fd2cf01710201fa9e21140138044a0e59bdae6221de90f54bff684833ad192aa712da633ba1d47f391cbba878b1f6ae5c035488e4490d31616a0566eca5b444d", @ANYRESHEX, @ANYRESHEX, @ANYRESOCT], 0x1, 0x0, &(0x7f0000000000)) r5 = open(&(0x7f00000025c0)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001840)={0x0, ""/256, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000100)='.\x00', 0x1a404ac, &(0x7f00000037c0)=ANY=[@ANYRESHEX, @ANYRESDEC, @ANYRES32, @ANYRESDEC=r6, @ANYRESOCT, @ANYRES16, @ANYBLOB="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", @ANYRESHEX, @ANYRESHEX, @ANYRESOCT], 0x1, 0x0, &(0x7f0000000000)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000002280)={"9784ca3a10487abf807539c3655a33e1", r4, r6, {0x80000000, 0x1000}, {0x1, 0x9}, 0x100, [0xfffffffffffffffa, 0x6, 0xfff, 0x8, 0x6, 0x6, 0x2, 0x191404ee, 0x3, 0x0, 0x415, 0xd47c, 0x100000001, 0x1, 0xa535, 0x6]}) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x9, 0x100000001) 11:20:11 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f6365762f6c6f6f703275933d5e72cdfbef1b37d500af1aa75a3bce2d1e5d19b1b60b90fd5cb112aa3e28e86e12ac7a7cc3cd4048c8a4a545e0e438ce554493e0b54429ceda5c19a6f9caaead7c4454273e1048d5c9c541c6a2d3cd5fa2b2add96cb94ab55a9bd5a8a44c8300000000000096dbea06e40f8175db4de573176c52240fe8dba26eac910bf223856410c46c1f6c4e41af305a005e0257a3cc785034380000000000000000d426b87353ae98dfd8a92435dc4f2bcc9e9d075274c6616099c3b266721aef901aeecaa32dcc50330cea3fa8bbdeba3aa84a2899a6a9e0929034f9673d99f4e3bc1c057063f0d6b7e76d1c01333eed624b2cb06b2e5a0ff1"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 462.329530][T13331] loop3: detected capacity change from 0 to 64 11:20:11 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 462.375069][ T5020] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 462.375573][T13335] loop5: detected capacity change from 0 to 64 [ 462.398843][T13334] loop2: detected capacity change from 0 to 64 11:20:11 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f00000022c0)={0x6, 0x8, '\x00', 0x0, &(0x7f0000002280)=[0x0]}) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) (async) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f00000022c0)={0x6, 0x8, '\x00', 0x0, &(0x7f0000002280)=[0x0]}) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) 11:20:11 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './bus\x00'}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000140)) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 462.508808][T13342] loop4: detected capacity change from 0 to 64 [ 462.523784][T13341] loop1: detected capacity change from 0 to 64 [ 462.551107][T13344] loop0: detected capacity change from 0 to 64 11:20:11 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) 11:20:11 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:11 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f6365762f6c6f6f703275933d5e72cdfbef1b37d500af1aa75a3bce2d1e5d19b1b60b90fd5cb112aa3e28e86e12ac7a7cc3cd4048c8a4a545e0e438ce554493e0b54429ceda5c19a6f9caaead7c4454273e1048d5c9c541c6a2d3cd5fa2b2add96cb94ab55a9bd5a8a44c8300000000000096dbea06e40f8175db4de573176c52240fe8dba26eac910bf223856410c46c1f6c4e41af305a005e0257a3cc785034380000000000000000d426b87353ae98dfd8a92435dc4f2bcc9e9d075274c6616099c3b266721aef901aeecaa32dcc50330cea3fa8bbdeba3aa84a2899a6a9e0929034f9673d99f4e3bc1c057063f0d6b7e76d1c01333eed624b2cb06b2e5a0ff1"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:11 executing program 0: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000002280)=ANY=[@ANYBLOB="2f0e0000"], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) read$FUSE(r0, &(0x7f0000004400)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000006440)={0x78, 0x0, r3, {0x6, 0x1, 0x0, {0x1, 0x0, 0x80, 0x7fff, 0x2, 0x2, 0x372, 0x101, 0x8, 0xa000, 0x800, r1, 0xffffffffffffffff, 0x4, 0x7}}}, 0x78) r4 = creat(&(0x7f00000064c0)='./bus\x00', 0x61) fallocate(r4, 0x0, 0x10000000, 0x2000c04) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x80}) write$cgroup_int(r4, &(0x7f0000004300)=0x6, 0x12) read$FUSE(r4, &(0x7f00000022c0)={0x2020}, 0x2020) r5 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000200)='./bus\x00', 0x1240, 0x4) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r7 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000080)={0x0, r7, 0x1f, 0x0, 0x81}) pwrite64(r6, &(0x7f0000004340)="a17de2d690c2cf2bfb5faa490e681b503cafbc00f54e752cca13aa278dde3aa249f43c5b0ef8aa968288373e39fe8b4370664c638ee83bea15a72ddef2de4324940a6b5424723954b55394b21458d717e76e06e6cd3d82d732991b6d1dd70b168465383e7bf95e6a6b080ab25245f6f9732af5b660528c6bd6d47c65880ad777dd07826277155d9a2d20c8470e367142a7bf51a7d8ca1fec94330c4cb352b32b5f5f14a2a897ccdbdba0a1cd82108f05c611f1af71a5", 0xb6, 0x8) [ 462.634771][T13348] loop2: detected capacity change from 0 to 64 [ 462.750958][T13353] loop5: detected capacity change from 0 to 64 [ 462.754051][T13352] loop4: detected capacity change from 0 to 64 [ 462.773710][T13360] loop3: detected capacity change from 0 to 64 [ 462.774568][T13358] loop1: detected capacity change from 0 to 64 11:20:12 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000002280)={0x2020, 0x0, 0x0}, 0x2020) r3 = creat(&(0x7f0000002640)='./bus\x00', 0x1) r4 = openat$cgroup_subtree(r3, &(0x7f0000000540), 0x2, 0x0) fstat(r4, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000002780)='./file1\x00', &(0x7f00000005c0), 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB='nfs_export=off,xino=on,xino=off,nfs_export=off,nfs_export=on,index=on,xino=auto,obj_user=,seclabel,fsname=-+(^)/[,fowner<', @ANYRESDEC=r5, @ANYBLOB='0x0, 0x0}, 0x0) lchown(&(0x7f0000000000)='./file1\x00', r6, 0x0) lchown(&(0x7f00000039c0)='./file2\x00', r6, r7) write$FUSE_ATTR(r0, &(0x7f00000042c0)={0x78, 0x0, r2, {0x5, 0x2, 0x0, {0x4, 0x0, 0x7, 0x2, 0x804, 0x6868, 0x57, 0x2, 0x7f, 0xa000, 0x1, r5, r7, 0x3, 0x2}}}, 0x78) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:12 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x1f, 0x0, 0x81}) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 462.812297][T13361] loop0: detected capacity change from 0 to 64 11:20:12 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:12 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 462.948804][ T27] audit: type=1804 audit(1688296812.140:653): pid=13361 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2403862440/syzkaller.19u26m/469/file0/bus" dev="loop0" ino=3 res=1 errno=0 [ 462.964897][T13371] loop2: detected capacity change from 0 to 64 11:20:12 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './bus\x00'}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000140)) 11:20:12 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) (fail_nth: 1) [ 463.017201][T13375] loop4: detected capacity change from 0 to 64 [ 463.064539][ T27] audit: type=1804 audit(1688296812.180:654): pid=13361 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2403862440/syzkaller.19u26m/469/file0/file0" dev="loop0" ino=4 res=1 errno=0 [ 463.072962][T13377] loop5: detected capacity change from 0 to 64 11:20:12 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000002280)={0x2020, 0x0, 0x0}, 0x2020) r3 = creat(&(0x7f0000002640)='./bus\x00', 0x1) r4 = openat$cgroup_subtree(r3, &(0x7f0000000540), 0x2, 0x0) fstat(r4, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000002780)='./file1\x00', &(0x7f00000005c0), 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB='nfs_export=off,xino=on,xino=off,nfs_export=off,nfs_export=on,index=on,xino=auto,obj_user=,seclabel,fsname=-+(^)/[,fowner<', @ANYRESDEC=r5, @ANYBLOB='0x0, 0x0}, 0x0) lchown(&(0x7f0000000000)='./file1\x00', r6, 0x0) (async) lchown(&(0x7f00000039c0)='./file2\x00', r6, r7) (async) write$FUSE_ATTR(r0, &(0x7f00000042c0)={0x78, 0x0, r2, {0x5, 0x2, 0x0, {0x4, 0x0, 0x7, 0x2, 0x804, 0x6868, 0x57, 0x2, 0x7f, 0xa000, 0x1, r5, r7, 0x3, 0x2}}}, 0x78) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:12 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRES8=r2], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 463.136884][T13380] loop1: detected capacity change from 0 to 64 [ 463.165734][T13381] loop3: detected capacity change from 0 to 64 [ 463.265080][ T27] audit: type=1800 audit(1688296812.460:655): pid=13385 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1956 res=0 errno=0 11:20:12 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './bus\x00'}) 11:20:12 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:12 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x4040, 0x44) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000080)='./bus\x00', 0x189840, 0x1a4) 11:20:12 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000002280)={0x2020, 0x0, 0x0}, 0x2020) r3 = creat(&(0x7f0000002640)='./bus\x00', 0x1) r4 = openat$cgroup_subtree(r3, &(0x7f0000000540), 0x2, 0x0) fstat(r4, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000002780)='./file1\x00', &(0x7f00000005c0), 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB='nfs_export=off,xino=on,xino=off,nfs_export=off,nfs_export=on,index=on,xino=auto,obj_user=,seclabel,fsname=-+(^)/[,fowner<', @ANYRESDEC=r5, @ANYBLOB='0x0, 0x0}, 0x0) lchown(&(0x7f0000000000)='./file1\x00', r6, 0x0) lchown(&(0x7f00000039c0)='./file2\x00', r6, r7) write$FUSE_ATTR(r0, &(0x7f00000042c0)={0x78, 0x0, r2, {0x5, 0x2, 0x0, {0x4, 0x0, 0x7, 0x2, 0x804, 0x6868, 0x57, 0x2, 0x7f, 0xa000, 0x1, r5, r7, 0x3, 0x2}}}, 0x78) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000002280)={0x2020}, 0x2020) (async) creat(&(0x7f0000002640)='./bus\x00', 0x1) (async) openat$cgroup_subtree(r3, &(0x7f0000000540), 0x2, 0x0) (async) fstat(r4, &(0x7f0000002180)) (async) mount$overlay(0x0, &(0x7f0000002780)='./file1\x00', &(0x7f00000005c0), 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB='nfs_export=off,xino=on,xino=off,nfs_export=off,nfs_export=on,index=on,xino=auto,obj_user=,seclabel,fsname=-+(^)/[,fowner<', @ANYRESDEC=r5, @ANYBLOB=' [ 463.651823][T13382] dump_stack_lvl+0x1e7/0x2d0 [ 463.656548][T13382] ? nf_tcp_handle_invalid+0x650/0x650 [ 463.662040][T13382] ? panic+0x770/0x770 [ 463.666157][T13382] ? __might_sleep+0xc0/0xc0 [ 463.670795][T13382] ? __lock_acquire+0x1267/0x7f70 [ 463.675948][T13382] should_fail_ex+0x3aa/0x4e0 [ 463.680662][T13382] should_failslab+0x9/0x20 [ 463.685189][T13382] slab_pre_alloc_hook+0x59/0x2b0 [ 463.690224][T13382] ? tomoyo_realpath_from_path+0xcf/0x5e0 [ 463.695945][T13382] __kmem_cache_alloc_node+0x4b/0x270 [ 463.701317][T13382] ? read_lock_is_recursive+0x20/0x20 [ 463.706688][T13382] ? tomoyo_realpath_from_path+0xcf/0x5e0 [ 463.712402][T13382] __kmalloc+0xa8/0x230 [ 463.716660][T13382] ? rcu_is_watching+0x15/0xb0 [ 463.721418][T13382] tomoyo_realpath_from_path+0xcf/0x5e0 [ 463.726967][T13382] tomoyo_path_number_perm+0x210/0x840 [ 463.732418][T13382] ? rcu_read_lock_bh_held+0x120/0x120 [ 463.737880][T13382] ? trace_contention_end+0x3c/0xf0 [ 463.743074][T13382] ? __lock_acquire+0x7f70/0x7f70 [ 463.748099][T13382] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 463.753582][T13382] ? file_end_write+0x250/0x250 [ 463.758451][T13382] ? __fget_files+0x3cf/0x440 [ 463.763135][T13382] security_file_ioctl+0x71/0xa0 [ 463.768068][T13382] __se_sys_ioctl+0x47/0x170 [ 463.772657][T13382] do_syscall_64+0x41/0xc0 [ 463.777173][T13382] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 463.783062][T13382] RIP: 0033:0x7fc8b088c389 [ 463.787476][T13382] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 463.807136][T13382] RSP: 002b:00007fc8b16cd168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.815543][T13382] RAX: ffffffffffffffda RBX: 00007fc8b09abf80 RCX: 00007fc8b088c389 11:20:13 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x4040, 0x44) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000080)='./bus\x00', 0x189840, 0x1a4) [ 463.823508][T13382] RDX: 0000000000000000 RSI: 0000000040106e8c RDI: 0000000000000004 [ 463.831473][T13382] RBP: 00007fc8b16cd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 463.839437][T13382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.847423][T13382] R13: 00007ffe8ec0132f R14: 00007fc8b16cd300 R15: 0000000000022000 [ 463.855417][T13382] 11:20:13 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000002280)='./file1\x00', 0x14113e, 0x140) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 463.901893][T13412] loop4: detected capacity change from 0 to 64 [ 463.907922][T13413] loop3: detected capacity change from 0 to 64 [ 463.911428][T13411] loop1: detected capacity change from 0 to 64 [ 463.956929][ T27] audit: type=1800 audit(1688296813.150:657): pid=13414 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1971 res=0 errno=0 [ 464.004414][T13418] loop5: detected capacity change from 0 to 64 [ 464.011295][T13420] loop2: detected capacity change from 0 to 64 11:20:13 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e8c, 0x0) 11:20:13 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) 11:20:13 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/dev/lkop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) fsmount(r1, 0x0, 0x4) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:13 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x4040, 0x44) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000080)='./bus\x00', 0x189840, 0x1a4) 11:20:13 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRES8=r2], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:13 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000002280)='./file1\x00', 0x14113e, 0x140) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 464.173986][T13382] ERROR: Out of memory at tomoyo_realpath_from_path. [ 464.205508][ T5254] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 464.298583][ T27] audit: type=1800 audit(1688296813.490:658): pid=13431 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1969 res=0 errno=0 [ 464.299092][T13430] loop1: detected capacity change from 0 to 64 [ 464.327623][T13434] loop3: detected capacity change from 0 to 64 [ 464.334141][T13428] loop4: detected capacity change from 0 to 64 11:20:13 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000002280)='./file1\x00', 0x14113e, 0x140) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000002280)='./file1\x00', 0x14113e, 0x140) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) 11:20:13 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:13 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000002280)={0x4, 0x1, 0x7, 0xff, 0x3, [{0x0, 0xdfb, 0x4, '\x00', 0x186}, {0xffffffff, 0x8, 0x3, '\x00', 0x800}, {0x1, 0x80000001, 0x5, '\x00', 0x1008}]}) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x40040) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000200)=0x2) sendfile(r0, r2, 0x0, 0x800) 11:20:13 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) [ 464.504748][T13440] loop2: detected capacity change from 0 to 64 11:20:13 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/dev/lkop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) fsmount(r1, 0x0, 0x4) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 464.584154][T13445] loop4: detected capacity change from 0 to 64 [ 464.595547][T13446] loop5: detected capacity change from 0 to 64 11:20:13 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 464.684148][T13442] loop0: detected capacity change from 0 to 2048 [ 464.697870][T13448] loop3: detected capacity change from 0 to 64 [ 464.763395][T13456] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 464.773502][T13455] loop1: detected capacity change from 0 to 64 11:20:14 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x2, 0x0) 11:20:14 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x60000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) writev(r3, &(0x7f0000002280), 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:14 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000002280)={0x4, 0x1, 0x7, 0xff, 0x3, [{0x0, 0xdfb, 0x4, '\x00', 0x186}, {0xffffffff, 0x8, 0x3, '\x00', 0x800}, {0x1, 0x80000001, 0x5, '\x00', 0x1008}]}) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x40040) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000200)=0x2) sendfile(r0, r2, 0x0, 0x800) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000002280)={0x4, 0x1, 0x7, 0xff, 0x3, [{0x0, 0xdfb, 0x4, '\x00', 0x186}, {0xffffffff, 0x8, 0x3, '\x00', 0x800}, {0x1, 0x80000001, 0x5, '\x00', 0x1008}]}) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x40040) (async) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000200)=0x2) (async) sendfile(r0, r2, 0x0, 0x800) (async) 11:20:14 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) [ 464.842420][T13458] loop4: detected capacity change from 0 to 64 11:20:14 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/dev/lkop0\x00'], &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) fsmount(r1, 0x0, 0x4) (async) fsmount(r1, 0x0, 0x4) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 464.909592][T13463] loop2: detected capacity change from 0 to 64 [ 464.924364][T13464] loop5: detected capacity change from 0 to 64 11:20:14 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:14 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000200)='./file0\x00', 0x60000, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) (async) writev(r3, &(0x7f0000002280), 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 465.029918][T13468] loop3: detected capacity change from 0 to 64 [ 465.060692][T13474] loop1: detected capacity change from 0 to 64 [ 465.088213][T13478] loop4: detected capacity change from 0 to 64 [ 465.108655][T13473] loop0: detected capacity change from 0 to 2048 11:20:14 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000002280)={0x4, 0x1, 0x7, 0xff, 0x3, [{0x0, 0xdfb, 0x4, '\x00', 0x186}, {0xffffffff, 0x8, 0x3, '\x00', 0x800}, {0x1, 0x80000001, 0x5, '\x00', 0x1008}]}) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x40040) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000200)=0x2) sendfile(r0, r2, 0x0, 0x800) 11:20:14 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:14 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) unlink(&(0x7f0000000200)='./file0\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 465.239102][T13482] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:20:14 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) 11:20:14 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x541b, 0x0) [ 465.293093][T13483] loop2: detected capacity change from 0 to 64 [ 465.340355][T13490] loop5: detected capacity change from 0 to 64 11:20:14 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x60000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) writev(r3, &(0x7f0000002280), 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 465.372416][T13492] loop4: detected capacity change from 0 to 64 [ 465.424576][T13493] loop1: detected capacity change from 0 to 64 11:20:14 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 465.514137][T13496] loop3: detected capacity change from 0 to 64 11:20:14 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) unlink(&(0x7f0000000200)='./file0\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) unlink(&(0x7f0000000200)='./file0\x00') (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) 11:20:14 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000080)) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:14 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) [ 465.634328][T13500] loop2: detected capacity change from 0 to 64 [ 465.687033][T13499] loop0: detected capacity change from 0 to 2048 11:20:15 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) fstatfs(r0, &(0x7f0000002280)=""/201) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 465.776576][T13507] loop3: detected capacity change from 0 to 64 [ 465.804156][T13509] loop1: detected capacity change from 0 to 64 [ 465.809679][T13508] loop4: detected capacity change from 0 to 64 [ 465.845778][T13510] loop5: detected capacity change from 0 to 64 11:20:15 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") [ 465.920869][T13511] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:20:15 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:15 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x5421, 0x0) 11:20:15 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000080)) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 466.004678][T13514] loop2: detected capacity change from 0 to 64 11:20:15 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) unlink(&(0x7f0000000200)='./file0\x00') (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 466.121686][T13519] loop3: detected capacity change from 0 to 64 [ 466.168844][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 466.168859][ T27] audit: type=1804 audit(1688296815.360:663): pid=13523 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir2922901718/syzkaller.5LW5XA/404/file0/file0" dev="loop2" ino=4 res=1 errno=0 [ 466.203100][T13521] loop4: detected capacity change from 0 to 64 11:20:15 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) (async) fstatfs(r0, &(0x7f0000002280)=""/201) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async, rerun: 32) creat(&(0x7f0000000080)='./file1\x00', 0x0) (rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 466.244854][T13525] loop5: detected capacity change from 0 to 64 [ 466.261417][T13530] loop1: detected capacity change from 0 to 64 11:20:15 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") (fail_nth: 1) [ 466.329414][ T27] audit: type=1800 audit(1688296815.500:664): pid=13528 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1947 res=0 errno=0 11:20:15 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000080)) (async, rerun: 32) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (rerun: 32) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 32) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (rerun: 32) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async, rerun: 64) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (rerun: 64) 11:20:15 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 466.404372][T13527] loop0: detected capacity change from 0 to 2048 [ 466.439452][T13535] loop2: detected capacity change from 0 to 64 11:20:15 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x104090, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000002280)={0x97c9, 0xff, 0x5, 0x7, 0x1, 0x42}) lseek(r2, 0x8, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 466.473624][ T5255] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 466.482328][ T27] audit: type=1800 audit(1688296815.620:665): pid=13536 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1946 res=0 errno=0 11:20:15 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) (async) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x1f, 0x0, 0x81}) fstatfs(r0, &(0x7f0000002280)=""/201) (async) fstatfs(r0, &(0x7f0000002280)=""/201) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 466.528015][T13540] FAULT_INJECTION: forcing a failure. [ 466.528015][T13540] name failslab, interval 1, probability 0, space 0, times 0 [ 466.576011][T13544] loop4: detected capacity change from 0 to 64 [ 466.583354][T13540] CPU: 1 PID: 13540 Comm: syz-executor.3 Not tainted 6.4.0-syzkaller-10096-gdfab92f27c60 #0 [ 466.593468][T13540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 466.603549][T13540] Call Trace: [ 466.606852][T13540] [ 466.609805][T13540] dump_stack_lvl+0x1e7/0x2d0 [ 466.614529][T13540] ? nf_tcp_handle_invalid+0x650/0x650 [ 466.620018][T13540] ? panic+0x770/0x770 [ 466.624102][T13540] ? vfs_write+0x901/0xaf0 [ 466.628520][T13540] should_fail_ex+0x3aa/0x4e0 [ 466.633194][T13540] should_failslab+0x9/0x20 [ 466.637951][T13540] slab_pre_alloc_hook+0x59/0x2b0 [ 466.642975][T13540] ? mutex_unlock+0x10/0x10 [ 466.647479][T13540] ? __se_sys_memfd_create+0x231/0x980 [ 466.652934][T13540] __kmem_cache_alloc_node+0x4b/0x270 [ 466.658320][T13540] ? __se_sys_memfd_create+0x231/0x980 [ 466.663770][T13540] __kmalloc+0xa8/0x230 [ 466.667922][T13540] __se_sys_memfd_create+0x231/0x980 [ 466.673466][T13540] ? __x64_sys_memfd_create+0x60/0x60 [ 466.678830][T13540] ? syscall_enter_from_user_mode+0x32/0x230 [ 466.684811][T13540] ? lockdep_hardirqs_on+0x98/0x140 [ 466.690009][T13540] ? syscall_enter_from_user_mode+0x32/0x230 [ 466.695998][T13540] do_syscall_64+0x41/0xc0 [ 466.700410][T13540] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 466.706297][T13540] RIP: 0033:0x7fe4b228c389 [ 466.710706][T13540] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 466.730316][T13540] RSP: 002b:00007fe4b2f4af38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 466.738727][T13540] RAX: ffffffffffffffda RBX: 00000000000000ab RCX: 00007fe4b228c389 [ 466.746695][T13540] RDX: 00007fe4b2f4afdc RSI: 0000000000000000 RDI: 00007fe4b22d6809 [ 466.754664][T13540] RBP: 00000000000000ab R08: 00007fe4b2f4ae20 R09: ffffffffffffffff [ 466.762628][T13540] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000100 [ 466.770592][T13540] R13: 00007fe4b2f4afdc R14: 00007fe4b2f4afe0 R15: 0000000020002280 [ 466.778567][T13540] [ 466.800272][T13545] loop5: detected capacity change from 0 to 64 [ 466.811196][T13547] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:20:16 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") (fail_nth: 2) 11:20:16 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:16 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x5450, 0x0) [ 466.855842][T13548] loop1: detected capacity change from 0 to 64 [ 466.969190][T13553] FAULT_INJECTION: forcing a failure. [ 466.969190][T13553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 466.996019][ T5036] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 11:20:16 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x11) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:16 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x104090, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000002280)={0x97c9, 0xff, 0x5, 0x7, 0x1, 0x42}) lseek(r2, 0x8, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 467.013460][ T27] audit: type=1800 audit(1688296816.210:666): pid=13548 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1958 res=0 errno=0 [ 467.094602][T13557] loop4: detected capacity change from 0 to 64 [ 467.103029][T13553] CPU: 1 PID: 13553 Comm: syz-executor.3 Not tainted 6.4.0-syzkaller-10096-gdfab92f27c60 #0 [ 467.113138][T13553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 467.123217][T13553] Call Trace: [ 467.126518][T13553] [ 467.129482][T13553] dump_stack_lvl+0x1e7/0x2d0 [ 467.132290][T13556] loop0: detected capacity change from 0 to 2048 [ 467.134174][T13553] ? nf_tcp_handle_invalid+0x650/0x650 [ 467.134208][T13553] ? panic+0x770/0x770 [ 467.134237][T13553] ? __lock_acquire+0x7f70/0x7f70 [ 467.155134][T13553] should_fail_ex+0x3aa/0x4e0 [ 467.159853][T13553] _copy_from_user+0x2f/0xe0 [ 467.162054][T13558] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 467.164568][T13553] __se_sys_memfd_create+0x274/0x980 [ 467.164599][T13553] ? __x64_sys_memfd_create+0x60/0x60 [ 467.164620][T13553] ? syscall_enter_from_user_mode+0x32/0x230 [ 467.164648][T13553] ? lockdep_hardirqs_on+0x98/0x140 [ 467.164673][T13553] ? syscall_enter_from_user_mode+0x32/0x230 [ 467.164703][T13553] do_syscall_64+0x41/0xc0 [ 467.164725][T13553] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 467.164752][T13553] RIP: 0033:0x7fe4b228c389 [ 467.164770][T13553] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:20:16 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x5451, 0x0) [ 467.164787][T13553] RSP: 002b:00007fe4b2f4af38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 467.164809][T13553] RAX: ffffffffffffffda RBX: 00000000000000ab RCX: 00007fe4b228c389 [ 467.164824][T13553] RDX: 00007fe4b2f4afdc RSI: 0000000000000000 RDI: 00007fe4b22d6809 [ 467.164836][T13553] RBP: 00000000000000ab R08: 00007fe4b2f4ae20 R09: ffffffffffffffff [ 467.164850][T13553] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000100 [ 467.164863][T13553] R13: 00007fe4b2f4afdc R14: 00007fe4b2f4afe0 R15: 0000000020002280 [ 467.164890][T13553] 11:20:16 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 467.207784][T13562] loop1: detected capacity change from 0 to 64 [ 467.255519][ T27] audit: type=1800 audit(1688296816.390:667): pid=13560 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1970 res=0 errno=0 11:20:16 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x104090, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000002280)={0x97c9, 0xff, 0x5, 0x7, 0x1, 0x42}) (async) lseek(r2, 0x8, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:16 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") (fail_nth: 3) [ 467.367725][ T27] audit: type=1800 audit(1688296816.560:668): pid=13562 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1949 res=0 errno=0 11:20:16 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x11) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 467.465949][ T27] audit: type=1800 audit(1688296816.660:669): pid=13569 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1950 res=0 errno=0 [ 467.498233][T13568] loop1: detected capacity change from 0 to 64 [ 467.507950][T13573] loop4: detected capacity change from 0 to 64 11:20:16 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f00000022c0)=@filename='./file0\x00', &(0x7f0000002280)='./file1\x00', 0x0, 0x1885860, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000200)='./file0\x00', 0x14113e, 0x59) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) readv(r2, &(0x7f0000002500)=[{&(0x7f0000002300)=""/39, 0x27}, {&(0x7f0000002340)=""/14, 0xe}, {&(0x7f0000002380)=""/48, 0x30}, {&(0x7f00000023c0)=""/107, 0x6b}, {&(0x7f0000002440)=""/140, 0x8c}], 0x5) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x300000a, 0xa111, r0, 0x7b82000) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000002580)={0x8, 0x808000, 0x2, 0x529, 0x0, [0xd1cd, 0x1f, 0x8, 0x2]}) [ 467.580901][T13571] loop0: detected capacity change from 0 to 2048 [ 467.606495][T13578] loop2: detected capacity change from 0 to 64 [ 467.608447][T13579] FAULT_INJECTION: forcing a failure. [ 467.608447][T13579] name failslab, interval 1, probability 0, space 0, times 0 [ 467.654353][ T27] audit: type=1800 audit(1688296816.850:670): pid=13582 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1957 res=0 errno=0 [ 467.678615][T13579] CPU: 1 PID: 13579 Comm: syz-executor.3 Not tainted 6.4.0-syzkaller-10096-gdfab92f27c60 #0 [ 467.685745][T13580] loop5: detected capacity change from 0 to 64 [ 467.688710][T13579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 467.688724][T13579] Call Trace: [ 467.688731][T13579] [ 467.688739][T13579] dump_stack_lvl+0x1e7/0x2d0 [ 467.688771][T13579] ? nf_tcp_handle_invalid+0x650/0x650 [ 467.721282][T13579] ? panic+0x770/0x770 [ 467.725383][T13579] ? __might_sleep+0xc0/0xc0 [ 467.730015][T13579] ? kasan_set_track+0x61/0x70 [ 467.734817][T13579] ? __kasan_kmalloc+0x98/0xb0 [ 467.738690][ T27] audit: type=1804 audit(1688296816.920:671): pid=13578 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir2922901718/syzkaller.5LW5XA/406/file0/file0" dev="loop2" ino=4 res=1 errno=0 [ 467.739596][T13579] ? __kmalloc+0xb9/0x230 [ 467.739622][T13579] ? __se_sys_memfd_create+0x231/0x980 [ 467.739649][T13579] should_fail_ex+0x3aa/0x4e0 [ 467.778949][T13579] should_failslab+0x9/0x20 [ 467.783486][T13579] slab_pre_alloc_hook+0x59/0x2b0 [ 467.788557][T13579] kmem_cache_alloc_lru+0x4e/0x300 [ 467.793708][T13579] ? shmem_alloc_inode+0x28/0x40 [ 467.798663][T13579] shmem_alloc_inode+0x28/0x40 [ 467.803424][T13579] ? shmem_match+0x160/0x160 [ 467.808012][T13579] new_inode_pseudo+0x65/0x1d0 [ 467.812773][T13579] new_inode+0x29/0x1d0 [ 467.816923][T13579] ? do_raw_spin_unlock+0x13b/0x8b0 [ 467.822124][T13579] shmem_get_inode+0x305/0xc10 [ 467.826889][T13579] __shmem_file_setup+0x169/0x2c0 [ 467.831914][T13579] __se_sys_memfd_create+0x390/0x980 [ 467.837196][T13579] ? __x64_sys_memfd_create+0x60/0x60 [ 467.842574][T13579] ? syscall_enter_from_user_mode+0x32/0x230 [ 467.848561][T13579] ? lockdep_hardirqs_on+0x98/0x140 [ 467.853765][T13579] ? syscall_enter_from_user_mode+0x32/0x230 [ 467.859749][T13579] do_syscall_64+0x41/0xc0 [ 467.864164][T13579] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 467.870059][T13579] RIP: 0033:0x7fe4b228c389 [ 467.874490][T13579] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 467.894108][T13579] RSP: 002b:00007fe4b2f4af38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f 11:20:17 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) mkdir(&(0x7f0000004380)='./bus\x00', 0x82) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000004300), 0x208383, 0x0) sendfile(r3, r4, &(0x7f00000043c0)=0x8, 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0x0, r6, 0x1f, 0x0, 0x81}) read$FUSE(r6, &(0x7f0000004400)={0x2020}, 0x2020) open(&(0x7f0000002280)='./bus\x00', 0x42, 0x40) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat(r1, &(0x7f0000000200)='./file1\x00', 0x412080, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000022c0)='./bus\x00', 0x56) 11:20:17 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:17 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x11) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 467.902529][T13579] RAX: ffffffffffffffda RBX: 00000000000000ab RCX: 00007fe4b228c389 [ 467.910495][T13579] RDX: 00007fe4b2f4afdc RSI: 0000000000000000 RDI: 00007fe4b22d6809 [ 467.918456][T13579] RBP: 00000000000000ab R08: 00007fe4b2f4ae20 R09: ffffffffffffffff [ 467.926420][T13579] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000100 [ 467.934386][T13579] R13: 00007fe4b2f4afdc R14: 00007fe4b2f4afe0 R15: 0000000020002280 [ 467.942364][T13579] [ 467.992571][T13589] loop1: detected capacity change from 0 to 64 [ 467.999545][T13585] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:20:17 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x5452, 0x0) [ 468.034277][T13588] loop4: detected capacity change from 0 to 64 11:20:17 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 468.110127][T13591] loop2: detected capacity change from 0 to 64 11:20:17 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f00000022c0)=@filename='./file0\x00', &(0x7f0000002280)='./file1\x00', 0x0, 0x1885860, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000200)='./file0\x00', 0x14113e, 0x59) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) readv(r2, &(0x7f0000002500)=[{&(0x7f0000002300)=""/39, 0x27}, {&(0x7f0000002340)=""/14, 0xe}, {&(0x7f0000002380)=""/48, 0x30}, {&(0x7f00000023c0)=""/107, 0x6b}, {&(0x7f0000002440)=""/140, 0x8c}], 0x5) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x300000a, 0xa111, r0, 0x7b82000) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000002580)={0x8, 0x808000, 0x2, 0x529, 0x0, [0xd1cd, 0x1f, 0x8, 0x2]}) (async) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000002580)={0x8, 0x808000, 0x2, 0x529, 0x0, [0xd1cd, 0x1f, 0x8, 0x2]}) 11:20:17 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) fstat(r0, &(0x7f0000002280)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 468.231295][ T27] audit: type=1800 audit(1688296817.420:672): pid=13594 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1958 res=0 errno=0 11:20:17 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) mkdir(&(0x7f0000004380)='./bus\x00', 0x82) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) openat$zero(0xffffffffffffff9c, &(0x7f0000004300), 0x208383, 0x0) (async) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000004300), 0x208383, 0x0) sendfile(r3, r4, &(0x7f00000043c0)=0x8, 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) r6 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0x0, r6, 0x1f, 0x0, 0x81}) read$FUSE(r6, &(0x7f0000004400)={0x2020}, 0x2020) (async) read$FUSE(r6, &(0x7f0000004400)={0x2020}, 0x2020) open(&(0x7f0000002280)='./bus\x00', 0x42, 0x40) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat(r1, &(0x7f0000000200)='./file1\x00', 0x412080, 0x11) (async) openat(r1, &(0x7f0000000200)='./file1\x00', 0x412080, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000022c0)='./bus\x00', 0x56) [ 468.295720][T13600] loop4: detected capacity change from 0 to 64 11:20:17 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 468.413568][T13603] loop1: detected capacity change from 0 to 64 [ 468.420323][T13599] loop0: detected capacity change from 0 to 2048 [ 468.436028][T13604] loop5: detected capacity change from 0 to 64 [ 468.460639][T13606] loop2: detected capacity change from 0 to 64 11:20:17 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") (fail_nth: 4) 11:20:17 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x5460, 0x0) 11:20:17 executing program 1: r0 = syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r1 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f00000022c0)=@filename='./file0\x00', &(0x7f0000002280)='./file1\x00', 0x0, 0x1885860, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000200)='./file0\x00', 0x14113e, 0x59) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async, rerun: 32) readv(r2, &(0x7f0000002500)=[{&(0x7f0000002300)=""/39, 0x27}, {&(0x7f0000002340)=""/14, 0xe}, {&(0x7f0000002380)=""/48, 0x30}, {&(0x7f00000023c0)=""/107, 0x6b}, {&(0x7f0000002440)=""/140, 0x8c}], 0x5) (async, rerun: 32) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x300000a, 0xa111, r0, 0x7b82000) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async, rerun: 32) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async, rerun: 32) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000002580)={0x8, 0x808000, 0x2, 0x529, 0x0, [0xd1cd, 0x1f, 0x8, 0x2]}) [ 468.541827][T13608] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:20:17 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) fstat(r0, &(0x7f0000002280)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) fstat(r0, &(0x7f0000002280)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) [ 468.598959][T13611] loop4: detected capacity change from 0 to 64 11:20:17 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) mkdir(&(0x7f0000004380)='./bus\x00', 0x82) (async) mkdir(&(0x7f0000004380)='./bus\x00', 0x82) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000004300), 0x208383, 0x0) sendfile(r3, r4, &(0x7f00000043c0)=0x8, 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0x0, r6, 0x1f, 0x0, 0x81}) read$FUSE(r6, &(0x7f0000004400)={0x2020}, 0x2020) open(&(0x7f0000002280)='./bus\x00', 0x42, 0x40) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat(r1, &(0x7f0000000200)='./file1\x00', 0x412080, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000022c0)='./bus\x00', 0x56) [ 468.679152][T13616] FAULT_INJECTION: forcing a failure. [ 468.679152][T13616] name failslab, interval 1, probability 0, space 0, times 0 [ 468.704363][T13618] loop1: detected capacity change from 0 to 64 11:20:17 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 468.749598][T13621] loop5: detected capacity change from 0 to 64 [ 468.762864][T13616] CPU: 0 PID: 13616 Comm: syz-executor.3 Not tainted 6.4.0-syzkaller-10096-gdfab92f27c60 #0 [ 468.772992][T13616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 468.783078][T13616] Call Trace: [ 468.786400][T13616] [ 468.789361][T13616] dump_stack_lvl+0x1e7/0x2d0 [ 468.794081][T13616] ? nf_tcp_handle_invalid+0x650/0x650 [ 468.799568][T13616] ? panic+0x770/0x770 [ 468.803650][T13616] ? __might_sleep+0xc0/0xc0 [ 468.808251][T13616] should_fail_ex+0x3aa/0x4e0 [ 468.812942][T13616] should_failslab+0x9/0x20 [ 468.817443][T13616] slab_pre_alloc_hook+0x59/0x2b0 [ 468.822815][T13616] ? lockdep_softirqs_off+0x420/0x420 [ 468.828194][T13616] kmem_cache_alloc+0x52/0x300 [ 468.832965][T13616] ? security_inode_alloc+0x28/0x120 [ 468.838260][T13616] security_inode_alloc+0x28/0x120 [ 468.843371][T13616] inode_init_always+0x8e3/0xc00 [ 468.848316][T13616] ? shmem_match+0x160/0x160 [ 468.852929][T13616] new_inode_pseudo+0x98/0x1d0 [ 468.857689][T13616] new_inode+0x29/0x1d0 [ 468.861839][T13616] ? do_raw_spin_unlock+0x13b/0x8b0 [ 468.867045][T13616] shmem_get_inode+0x305/0xc10 [ 468.871826][T13616] __shmem_file_setup+0x169/0x2c0 [ 468.876855][T13616] __se_sys_memfd_create+0x390/0x980 [ 468.882138][T13616] ? __x64_sys_memfd_create+0x60/0x60 [ 468.887504][T13616] ? syscall_enter_from_user_mode+0x32/0x230 [ 468.893486][T13616] ? lockdep_hardirqs_on+0x98/0x140 [ 468.898685][T13616] ? syscall_enter_from_user_mode+0x32/0x230 [ 468.904667][T13616] do_syscall_64+0x41/0xc0 [ 468.909083][T13616] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 468.914978][T13616] RIP: 0033:0x7fe4b228c389 [ 468.919392][T13616] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 468.938992][T13616] RSP: 002b:00007fe4b2f4af38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f 11:20:18 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") (fail_nth: 5) [ 468.947404][T13616] RAX: ffffffffffffffda RBX: 00000000000000ab RCX: 00007fe4b228c389 [ 468.955387][T13616] RDX: 00007fe4b2f4afdc RSI: 0000000000000000 RDI: 00007fe4b22d6809 [ 468.963351][T13616] RBP: 00000000000000ab R08: 00007fe4b2f4ae20 R09: ffffffffffffffff [ 468.971321][T13616] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000100 [ 468.979288][T13616] R13: 00007fe4b2f4afdc R14: 00007fe4b2f4afe0 R15: 0000000020002280 [ 468.987269][T13616] [ 469.096421][T13622] loop0: detected capacity change from 0 to 2048 [ 469.113517][T13637] FAULT_INJECTION: forcing a failure. [ 469.113517][T13637] name failslab, interval 1, probability 0, space 0, times 0 [ 469.134848][T13638] loop4: detected capacity change from 0 to 64 [ 469.141236][T13637] CPU: 1 PID: 13637 Comm: syz-executor.3 Not tainted 6.4.0-syzkaller-10096-gdfab92f27c60 #0 [ 469.151331][T13637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 469.161391][T13637] Call Trace: [ 469.164668][T13637] [ 469.167600][T13637] dump_stack_lvl+0x1e7/0x2d0 [ 469.172296][T13637] ? nf_tcp_handle_invalid+0x650/0x650 [ 469.177759][T13637] ? panic+0x770/0x770 [ 469.181839][T13637] ? __might_sleep+0xc0/0xc0 [ 469.186442][T13637] should_fail_ex+0x3aa/0x4e0 [ 469.191122][T13637] should_failslab+0x9/0x20 [ 469.195619][T13637] slab_pre_alloc_hook+0x59/0x2b0 [ 469.200647][T13637] ? mpol_put_task_policy+0xe0/0xe0 [ 469.205841][T13637] kmem_cache_alloc_lru+0x4e/0x300 [ 469.210950][T13637] ? __d_alloc+0x31/0x710 [ 469.215277][T13637] __d_alloc+0x31/0x710 [ 469.219423][T13637] ? lockdep_softirqs_off+0x420/0x420 [ 469.224801][T13637] d_alloc_pseudo+0x1d/0x70 [ 469.229305][T13637] alloc_file_pseudo+0x135/0x2f0 [ 469.234246][T13637] ? alloc_empty_backing_file+0xd0/0xd0 [ 469.239785][T13637] ? shmem_get_inode+0x9c1/0xc10 [ 469.244725][T13637] __shmem_file_setup+0x1dd/0x2c0 [ 469.249753][T13637] __se_sys_memfd_create+0x390/0x980 [ 469.255032][T13637] ? __x64_sys_memfd_create+0x60/0x60 [ 469.260402][T13637] ? syscall_enter_from_user_mode+0x32/0x230 [ 469.266468][T13637] ? lockdep_hardirqs_on+0x98/0x140 [ 469.271669][T13637] ? syscall_enter_from_user_mode+0x32/0x230 [ 469.277651][T13637] do_syscall_64+0x41/0xc0 [ 469.282069][T13637] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 469.287964][T13637] RIP: 0033:0x7fe4b228c389 [ 469.292372][T13637] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 469.311978][T13637] RSP: 002b:00007fe4b2f4af38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 469.320398][T13637] RAX: ffffffffffffffda RBX: 00000000000000ab RCX: 00007fe4b228c389 [ 469.328360][T13637] RDX: 00007fe4b2f4afdc RSI: 0000000000000000 RDI: 00007fe4b22d6809 [ 469.336324][T13637] RBP: 00000000000000ab R08: 00007fe4b2f4ae20 R09: ffffffffffffffff 11:20:18 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) open(&(0x7f0000000200)='./file0/file0\x00', 0x1, 0x92) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 469.344289][T13637] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000100 [ 469.352252][T13637] R13: 00007fe4b2f4afdc R14: 00007fe4b2f4afe0 R15: 0000000020002280 [ 469.360226][T13637] [ 469.376830][T13635] loop2: detected capacity change from 0 to 64 11:20:18 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 469.467477][T13635] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=75622f2e) [ 469.478313][T13640] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 469.489498][T13642] loop1: detected capacity change from 0 to 64 11:20:18 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40049409, 0x0) 11:20:18 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) open(&(0x7f0000000200)='./file0/file0\x00', 0x1, 0x92) (async, rerun: 32) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (rerun: 32) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:18 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = syz_io_uring_complete(0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) sendfile(r1, r3, &(0x7f0000000200)=0x5d, 0x9) [ 469.559557][T13644] loop4: detected capacity change from 0 to 64 11:20:18 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:18 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) open(&(0x7f0000000200)='./file0/file0\x00', 0x1, 0x92) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 469.657710][T13649] loop2: detected capacity change from 0 to 64 [ 469.736629][T13646] loop0: detected capacity change from 0 to 2048 [ 469.766364][T13659] loop4: detected capacity change from 0 to 64 11:20:19 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) fstat(r0, &(0x7f0000002280)) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:19 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000002380)={0x6, 0x0, &(0x7f0000002300)=[{&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000002280)=""/14, 0xe}, {&(0x7f00000022c0)=""/20, 0x14}], &(0x7f0000002340)=[0x6da9, 0x6d99], 0x3}, 0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:19 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = syz_io_uring_complete(0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) sendfile(r1, r3, &(0x7f0000000200)=0x5d, 0x9) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) syz_io_uring_complete(0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) fallocate(r2, 0x0, 0x0, 0x110001) (async) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) (async) sendfile(r1, r3, &(0x7f0000000200)=0x5d, 0x9) (async) 11:20:19 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$eJzs3U1sXEcdAPB5a69TtynZlISaNLQJhbZ81G4cN3xE0FTNhaipuFWquERpWiLSgEglaNVDkhM3WlXhyoc49VIBQqIXFPXEpRKNxKWnwoEDUZAqcYBCYhR7Zr3+Z1dv10m8Xu/vJ41n583szrz127dv33szk4Cx1Vj6u7AwU6V04Z03D//job9PX1/yRLtEa+nvZEeqmVKqcnoyvN6HE8vx1Y9eO94trtL80t+STs9caT/3rpTS2bQnXUyttOvCpTfem3/66Lkj5/e+/9bBy7dn7QEAYLx8++LBhZ1//fN92z9++/5DaUt7eTk+b+X01nzcfygf+Jfj/0Zana46QqepUG4yh0YoN9GlXGc9zVBuskf9U+F1mz3Kbampf6JjWbf1hlFWtuNWqhqzq9KNxuzs8m/ytPS7fqqaPX3y1AtnhtRQ4Jb71wMppT2CIIxjWNw27D0QwLJ4vfAGZ+OZhZuz/Gpn2ycS6uq/8mSjy/Ph1ljv7V/9o1X/r8/Z43DrbNatqaxX+Rxtzel4HSHevzTo57+8Xrwe0eyznb2uI4zK9YVe7ZxY53asVa/2x+1is/pGjsv78M2Q3/n5if/TUfkfA939e8zO/7f3WRugLYIw7LA43N0PsIHF++YWs5If7+uL+Vtq8u+oyZ+uyb+zJv+umnwYZ797+afp9Wrld378TT/o+bBynu3uHH9iwPbE85GD1h/v+x3UzdYf7yeGjewPx5498dXnn7u0fP9/1d7+r+XtfU9Ot/Jn62IuUM4XxvPq7Xv/W6vrafQod09oz91dyi893rG6XLVj5XVSx37mhnbMrH7etl7ldq8u1wrlpnO4I7R3Ouwz7gzPK8cfZb9a3q/JsL7NsB5ToR1lv7I9x7EdsBZle+x1/3/ZPmdSs3rh5KkTj+V02U7/NNHccn35vnVuN3Dz+u3/M5NW9//Z2l7ebHTuF7atLK869wutsHy+x/L9OV2+5747Mb20fPb49089f6tXHsbcmVde/d6xU6dO/NADDzzwoP1g2Hsm4Habe/mlH8ydeeXVR0++dOzFEy+eOL3/wIH98/MHvrZ/YW7puH6u8+ge2ExWvvSH3RIAAAAAAAAAAACgXz86cvjSX979ygfL/f9X+v+V/v/lzt/S//8nof9/7Cdf+sKXfoDbu+RXKU3GAVanQrlmDp8M7d0R6tkZnvepHLfn8cv9/0t1cVzX0v//3rA8jt9byoXhBG4YL2UqjEES5wv8bI7P5/hXCYaomu6+OMd141uXbb2MT2FcitFU/m9layjjmJT+373GdSr7/+3r0EZuvfXoTjjsdQS6++eYjf8tCMJKWFw0iwewMQxn/s+VExvlvGeJT//xW3dcD6XYlSdX7y/j+KVwMzb6/JPq31zzf7bnv+t7/xdmzGutrd7//PzyBx3Vpl391h/Xv4wDvWOw+j/O9Ze1eTj1V//iL0P98YJQn/4b6r+zz/pvWP/da6v/f7n+8rY98mC/9S+3uGqsbkc8b1yu/8XzxsXVsP5lbM+B13+NEzVey/XDOBuVeWYHNSrz//YS78N4PKfLjrDc5xDnOxm0/eX+ivI9sDO8flXz/Wb+39H29RzXfR7K/L9le2x1STc60s0u7+1m3dfAqPrQ9T9BGNuwuLh4e09o1Rhq5Qz9/R/274Rh1z/s979OnP939TH84zfM/xuP8eP8vzE/zv8b8+P8vzE/zv8b3884/2/Mvze8bpwfeKYm/9Mr+Re75e+qef59Nfm7a/I/U5O/tyb//pr8B2ry76nJf7Am/3M1+Z+vyX+oJv+Rmvwv1ORvdqU/yriuP4yz2D/P5x/GR7n+0+vzv6MmHxhdP3t731PP/fY7reX+/1Pt8yHlOt6hnG7m384/zul43Tt1pK/nvZvTfwv5G/18B4yTOH5G/H5/uCYfGF3lPi+fbxhDVfcRe/odt6rXcT6j5Ys5/lKOv5zjR3M8m+O5HO/L8fw6tY/b46nf/P7g69XK7/1tIb/f+8ljf6A4TtT+PtsTzw8Mej97HMdvUDdb/xq7gwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAxNY+nvwsJMldKFd948/OzRk3PXlzzRLtFa+jvZkWq2n5fSYzmeyPEv8oOrH712vDO+luMqzacqVe3l6Zkr7ZruSimdTXvSxdRKuy5ceuO9+aePnjtyfu/7bx28fPveAQAAANj8/h8AAP//SgoO2Q==") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086602, 0x0) [ 469.790516][T13660] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 469.892417][T13662] loop5: detected capacity change from 0 to 64 [ 469.938435][T13666] loop1: detected capacity change from 0 to 64 [ 469.941631][T13664] loop2: detected capacity change from 0 to 64 [ 470.033573][T13669] loop0: detected capacity change from 0 to 2048 [ 470.069673][T13670] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:20:19 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") (fail_nth: 6) 11:20:19 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:19 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) statx(r0, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x7ff, &(0x7f0000002280)) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 11:20:19 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000002380)={0x6, 0x0, &(0x7f0000002300)=[{&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000002280)=""/14, 0xe}, {&(0x7f00000022c0)=""/20, 0x14}], &(0x7f0000002340)=[0x6da9, 0x6d99], 0x3}, 0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:19 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) r0 = syz_io_uring_complete(0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) (async) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) (async) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x1f, 0x0, 0x81}) sendfile(r1, r3, &(0x7f0000000200)=0x5d, 0x9) (async) sendfile(r1, r3, &(0x7f0000000200)=0x5d, 0x9) 11:20:19 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$eJzs3U1sXEcdAPB5a69TtynZlISaNLQJhbZ81G4cN3xE0FTNhaipuFWquERpWiLSgEglaNVDkhM3WlXhyoc49VIBQqIXFPXEpRKNxKWnwoEDUZAqcYBCYhR7Zr3+Z1dv10m8Xu/vJ41n583szrz127dv33szk4Cx1Vj6u7AwU6V04Z03D//job9PX1/yRLtEa+nvZEeqmVKqcnoyvN6HE8vx1Y9eO94trtL80t+STs9caT/3rpTS2bQnXUyttOvCpTfem3/66Lkj5/e+/9bBy7dn7QEAYLx8++LBhZ1//fN92z9++/5DaUt7eTk+b+X01nzcfygf+Jfj/0Zana46QqepUG4yh0YoN9GlXGc9zVBuskf9U+F1mz3Kbampf6JjWbf1hlFWtuNWqhqzq9KNxuzs8m/ytPS7fqqaPX3y1AtnhtRQ4Jb71wMppT2CIIxjWNw27D0QwLJ4vfAGZ+OZhZuz/Gpn2ycS6uq/8mSjy/Ph1ljv7V/9o1X/r8/Z43DrbNatqaxX+Rxtzel4HSHevzTo57+8Xrwe0eyznb2uI4zK9YVe7ZxY53asVa/2x+1is/pGjsv78M2Q3/n5if/TUfkfA939e8zO/7f3WRugLYIw7LA43N0PsIHF++YWs5If7+uL+Vtq8u+oyZ+uyb+zJv+umnwYZ797+afp9Wrld378TT/o+bBynu3uHH9iwPbE85GD1h/v+x3UzdYf7yeGjewPx5498dXnn7u0fP9/1d7+r+XtfU9Ot/Jn62IuUM4XxvPq7Xv/W6vrafQod09oz91dyi893rG6XLVj5XVSx37mhnbMrH7etl7ldq8u1wrlpnO4I7R3Ouwz7gzPK8cfZb9a3q/JsL7NsB5ToR1lv7I9x7EdsBZle+x1/3/ZPmdSs3rh5KkTj+V02U7/NNHccn35vnVuN3Dz+u3/M5NW9//Z2l7ebHTuF7atLK869wutsHy+x/L9OV2+5747Mb20fPb49089f6tXHsbcmVde/d6xU6dO/NADDzzwoP1g2Hsm4Habe/mlH8ydeeXVR0++dOzFEy+eOL3/wIH98/MHvrZ/YW7puH6u8+ge2ExWvvSH3RIAAAAAAAAAAACgXz86cvjSX979ygfL/f9X+v+V/v/lzt/S//8nof9/7Cdf+sKXfoDbu+RXKU3GAVanQrlmDp8M7d0R6tkZnvepHLfn8cv9/0t1cVzX0v//3rA8jt9byoXhBG4YL2UqjEES5wv8bI7P5/hXCYaomu6+OMd141uXbb2MT2FcitFU/m9layjjmJT+373GdSr7/+3r0EZuvfXoTjjsdQS6++eYjf8tCMJKWFw0iwewMQxn/s+VExvlvGeJT//xW3dcD6XYlSdX7y/j+KVwMzb6/JPq31zzf7bnv+t7/xdmzGutrd7//PzyBx3Vpl391h/Xv4wDvWOw+j/O9Ze1eTj1V//iL0P98YJQn/4b6r+zz/pvWP/da6v/f7n+8rY98mC/9S+3uGqsbkc8b1yu/8XzxsXVsP5lbM+B13+NEzVey/XDOBuVeWYHNSrz//YS78N4PKfLjrDc5xDnOxm0/eX+ivI9sDO8flXz/Wb+39H29RzXfR7K/L9le2x1STc60s0u7+1m3dfAqPrQ9T9BGNuwuLh4e09o1Rhq5Qz9/R/274Rh1z/s979OnP939TH84zfM/xuP8eP8vzE/zv8b8+P8vzE/zv8b3884/2/Mvze8bpwfeKYm/9Mr+Re75e+qef59Nfm7a/I/U5O/tyb//pr8B2ry76nJf7Am/3M1+Z+vyX+oJv+Rmvwv1ORvdqU/yriuP4yz2D/P5x/GR7n+0+vzv6MmHxhdP3t731PP/fY7reX+/1Pt8yHlOt6hnG7m384/zul43Tt1pK/nvZvTfwv5G/18B4yTOH5G/H5/uCYfGF3lPi+fbxhDVfcRe/odt6rXcT6j5Ys5/lKOv5zjR3M8m+O5HO/L8fw6tY/b46nf/P7g69XK7/1tIb/f+8ljf6A4TtT+PtsTzw8Mej97HMdvUDdb/xq7gwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAxNY+nvwsJMldKFd948/OzRk3PXlzzRLtFa+jvZkWq2n5fSYzmeyPEv8oOrH712vDO+luMqzacqVe3l6Zkr7ZruSimdTXvSxdRKuy5ceuO9+aePnjtyfu/7bx28fPveAQAAANj8/h8AAP//SgoO2Q==") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086e81, 0x0) [ 470.170984][T13680] loop5: detected capacity change from 0 to 64 [ 470.175755][T13681] loop4: detected capacity change from 0 to 64 [ 470.201235][T13682] loop1: detected capacity change from 0 to 64 11:20:19 executing program 4: open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 470.247932][T13690] FAULT_INJECTION: forcing a failure. [ 470.247932][T13690] name failslab, interval 1, probability 0, space 0, times 0 [ 470.256890][T13686] loop2: detected capacity change from 0 to 64 [ 470.313521][T13690] CPU: 0 PID: 13690 Comm: syz-executor.3 Not tainted 6.4.0-syzkaller-10096-gdfab92f27c60 #0 [ 470.315126][T13687] I/O error, dev loop2, sector 56 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 [ 470.323616][T13690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 470.323630][T13690] Call Trace: [ 470.323638][T13690] [ 470.323646][T13690] dump_stack_lvl+0x1e7/0x2d0 [ 470.323696][T13690] ? nf_tcp_handle_invalid+0x650/0x650 [ 470.323719][T13690] ? panic+0x770/0x770 [ 470.323746][T13690] ? __might_sleep+0xc0/0xc0 [ 470.368262][T13690] should_fail_ex+0x3aa/0x4e0 [ 470.372947][T13690] should_failslab+0x9/0x20 [ 470.377447][T13690] slab_pre_alloc_hook+0x59/0x2b0 [ 470.382489][T13690] kmem_cache_alloc+0x52/0x300 [ 470.387265][T13690] ? alloc_empty_file+0x9e/0x1c0 [ 470.392199][T13690] alloc_empty_file+0x9e/0x1c0 [ 470.396956][T13690] alloc_file+0x5c/0x5f0 [ 470.401200][T13690] alloc_file_pseudo+0x25d/0x2f0 [ 470.406141][T13690] ? alloc_empty_backing_file+0xd0/0xd0 [ 470.411683][T13690] ? shmem_get_inode+0x9c1/0xc10 [ 470.416631][T13690] __shmem_file_setup+0x1dd/0x2c0 [ 470.421661][T13690] __se_sys_memfd_create+0x390/0x980 [ 470.426949][T13690] ? __x64_sys_memfd_create+0x60/0x60 [ 470.432319][T13690] ? syscall_enter_from_user_mode+0x32/0x230 [ 470.438299][T13690] ? lockdep_hardirqs_on+0x98/0x140 [ 470.443501][T13690] ? syscall_enter_from_user_mode+0x32/0x230 [ 470.449488][T13690] do_syscall_64+0x41/0xc0 [ 470.453908][T13690] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 470.459797][T13690] RIP: 0033:0x7fe4b228c389 [ 470.464208][T13690] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 470.483810][T13690] RSP: 002b:00007fe4b2f4af38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 470.492221][T13690] RAX: ffffffffffffffda RBX: 00000000000000ab RCX: 00007fe4b228c389 [ 470.500189][T13690] RDX: 00007fe4b2f4afdc RSI: 0000000000000000 RDI: 00007fe4b22d6809 11:20:19 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000c02) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x0, 0x80}) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000002380)={0x6, 0x0, &(0x7f0000002300)=[{&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000002280)=""/14, 0xe}, {&(0x7f00000022c0)=""/20, 0x14}], &(0x7f0000002340)=[0x6da9, 0x6d99], 0x3}, 0x20) (async) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000002380)={0x6, 0x0, &(0x7f0000002300)=[{&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000002280)=""/14, 0xe}, {&(0x7f00000022c0)=""/20, 0x14}], &(0x7f0000002340)=[0x6da9, 0x6d99], 0x3}, 0x20) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000240)={0x2020}, 0x2020) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 470.508593][T13690] RBP: 00000000000000ab R08: 00007fe4b2f4ae20 R09: ffffffffffffffff [ 470.516561][T13690] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000100 [ 470.524527][T13690] R13: 00007fe4b2f4afdc R14: 00007fe4b2f4afe0 R15: 0000000020002280 [ 470.532511][T13690] [ 470.553837][T13687] Buffer I/O error on dev loop2, logical block 7, lost async page write [ 470.571098][T13686] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=75622f2e) [ 470.607263][T13688] loop0: detected capacity change from 0 to 2048 [ 470.673817][T13694] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds 11:20:19 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086e8b, 0x0) 11:20:19 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") (fail_nth: 7) 11:20:19 executing program 4: open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:19 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) statx(r0, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x7ff, &(0x7f0000002280)) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) (async) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) [ 470.728995][T13696] loop1: detected capacity change from 0 to 64 11:20:20 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) r2 = creat(&(0x7f0000002640)='./bus\x00', 0x1) r3 = openat$cgroup_subtree(r2, &(0x7f0000000540), 0x2, 0x0) fstat(r3, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000002780)='./file1\x00', &(0x7f00000005c0), 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB='nfs_export=off,xino=on,xino=off,nfs_export=off,nfs_export=on,index=on,xino=auto,obj_user=,seclabel,fsname=-+(^)/[,fowner<', @ANYRESDEC=r4, @ANYBLOB='0x0}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280), 0x2a02000, &(0x7f0000002380)={[{@metacopy_off}, {@metacopy_off}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@obj_role={'obj_role', 0x3d, '&,]\''}}, {@subj_user={'subj_user', 0x3d, '/dev/loop'}}, {@smackfshat}, {@euid_eq={'euid', 0x3d, r5}}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) [ 470.817837][T13702] loop5: detected capacity change from 0 to 64 [ 470.852790][T13707] FAULT_INJECTION: forcing a failure. [ 470.852790][T13707] name failslab, interval 1, probability 0, space 0, times 0 11:20:20 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/cgroups\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000002280)='--\x00', &(0x7f00000022c0)='/dev/loop', 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:20 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) r0 = open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) statx(r0, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x7ff, &(0x7f0000002280)) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240)={0x2020}, 0x2020) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) (async, rerun: 64) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (rerun: 64) 11:20:20 executing program 4: open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 470.869807][T13708] loop2: detected capacity change from 0 to 64 [ 470.924538][T13707] CPU: 0 PID: 13707 Comm: syz-executor.3 Not tainted 6.4.0-syzkaller-10096-gdfab92f27c60 #0 [ 470.934672][T13707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 470.944779][T13707] Call Trace: [ 470.948087][T13707] [ 470.951255][T13707] dump_stack_lvl+0x1e7/0x2d0 [ 470.955971][T13707] ? nf_tcp_handle_invalid+0x650/0x650 [ 470.961469][T13707] ? panic+0x770/0x770 [ 470.965582][T13707] ? __might_sleep+0xc0/0xc0 [ 470.970217][T13707] should_fail_ex+0x3aa/0x4e0 [ 470.974930][T13707] should_failslab+0x9/0x20 [ 470.978068][T13711] loop0: detected capacity change from 0 to 2048 [ 470.979436][T13707] slab_pre_alloc_hook+0x59/0x2b0 [ 470.979476][T13707] kmem_cache_alloc+0x52/0x300 [ 470.995715][T13707] ? security_file_alloc+0x28/0x120 [ 471.000958][T13707] security_file_alloc+0x28/0x120 [ 471.006021][T13707] init_file+0xa0/0x200 [ 471.010306][T13707] alloc_empty_file+0xb8/0x1c0 [ 471.015104][T13707] alloc_file+0x5c/0x5f0 [ 471.019560][T13707] alloc_file_pseudo+0x25d/0x2f0 [ 471.024535][T13707] ? alloc_empty_backing_file+0xd0/0xd0 [ 471.030124][T13707] ? shmem_get_inode+0x9c1/0xc10 [ 471.035105][T13707] __shmem_file_setup+0x1dd/0x2c0 [ 471.040142][T13707] __se_sys_memfd_create+0x390/0x980 [ 471.045435][T13707] ? __x64_sys_memfd_create+0x60/0x60 [ 471.050903][T13707] ? syscall_enter_from_user_mode+0x32/0x230 [ 471.056897][T13707] ? lockdep_hardirqs_on+0x98/0x140 [ 471.062185][T13707] ? syscall_enter_from_user_mode+0x32/0x230 [ 471.068168][T13707] do_syscall_64+0x41/0xc0 [ 471.072587][T13707] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 471.078477][T13707] RIP: 0033:0x7fe4b228c389 [ 471.083180][T13707] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 471.102781][T13707] RSP: 002b:00007fe4b2f4af38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 471.111191][T13707] RAX: ffffffffffffffda RBX: 00000000000000ab RCX: 00007fe4b228c389 [ 471.119158][T13707] RDX: 00007fe4b2f4afdc RSI: 0000000000000000 RDI: 00007fe4b22d6809 [ 471.127133][T13707] RBP: 00000000000000ab R08: 00007fe4b2f4ae20 R09: ffffffffffffffff [ 471.135103][T13707] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000100 [ 471.143159][T13707] R13: 00007fe4b2f4afdc R14: 00007fe4b2f4afe0 R15: 0000000020002280 [ 471.151314][T13707] 11:20:20 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000180)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000001500)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40106e80, 0x0) [ 471.204623][T13713] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 471.219669][T13708] overlay: Unknown parameter 'obj_user' [ 471.244761][T13714] loop1: detected capacity change from 0 to 64 [ 471.254824][ T27] kauditd_printk_skb: 13 callbacks suppressed [ 471.254837][ T27] audit: type=1800 audit(1688296820.450:686): pid=13716 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=1958 res=0 errno=0 11:20:20 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async, rerun: 32) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async, rerun: 32) r2 = creat(&(0x7f0000002640)='./bus\x00', 0x1) r3 = openat$cgroup_subtree(r2, &(0x7f0000000540), 0x2, 0x0) fstat(r3, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000002780)='./file1\x00', &(0x7f00000005c0), 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB='nfs_export=off,xino=on,xino=off,nfs_export=off,nfs_export=on,index=on,xino=auto,obj_user=,seclabel,fsname=-+(^)/[,fowner<', @ANYRESDEC=r4, @ANYBLOB='0x0}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280), 0x2a02000, &(0x7f0000002380)={[{@metacopy_off}, {@metacopy_off}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@obj_role={'obj_role', 0x3d, '&,]\''}}, {@subj_user={'subj_user', 0x3d, '/dev/loop'}}, {@smackfshat}, {@euid_eq={'euid', 0x3d, r5}}]}) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:20 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(0x0, 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:20 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/cgroups\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000002280)='--\x00', &(0x7f00000022c0)='/dev/loop', 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/cgroups\x00', 0x0, 0x0) (async) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000002280)='--\x00', &(0x7f00000022c0)='/dev/loop', 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) [ 471.373491][ T6498] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 471.435932][T13721] loop4: detected capacity change from 0 to 64 [ 471.455104][ T27] audit: type=1800 audit(1688296820.650:687): pid=13724 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=1969 res=0 errno=0 [ 471.499601][T13726] loop2: detected capacity change from 0 to 64 [ 471.519554][T13723] mmap: map_count 31 vma iterator 27 [ 471.578248][T13723] mm ffff88807f947200 task_size 140737488351232 [ 471.578248][T13723] get_unmapped_area ffffffff81318940 [ 471.578248][T13723] mmap_base 139764136321024 mmap_legacy_base 47868658847744 [ 471.578248][T13723] pgd ffff888021b2a000 mm_users 1 mm_count 1 pgtables_bytes 94208 map_count 32 [ 471.578248][T13723] hiwater_rss 920 hiwater_vm b6c0 total_vm b71b locked_vm 0 [ 471.578248][T13723] pinned_vm 0 data_vm a80f exec_vm b4 stack_vm 21 [ 471.578248][T13723] start_code 7f1d5ee24000 end_code 7f1d5eed53c1 start_data 7f1d5ef90000 end_data 7f1d5ef90000 [ 471.578248][T13723] start_brk 55555683b000 brk 55555685d000 start_stack 7ffc8d0ce820 [ 471.578248][T13723] arg_start 7ffc8d0cfec8 arg_end 7ffc8d0cfee2 env_start 7ffc8d0cfee2 env_end 7ffc8d0cffe3 [ 471.578248][T13723] binfmt ffffffff8d46ba60 flags 7fd [ 471.578248][T13723] ioctx_table 0000000000000000 [ 471.578248][T13723] owner ffff888019ef1dc0 exe_file ffff888026157400 [ 471.578248][T13723] notifier_subscriptions 0000000000000000 [ 471.578248][T13723] numa_next_scan 4294984354 numa_scan_offset 0 numa_scan_seq 0 [ 471.578248][T13723] tlb_flush_pending 0 [ 471.578248][T13723] def_flags: 0x0() [ 471.599920][T13725] loop0: detected capacity change from 0 to 2048 [ 471.715781][T13733] loop1: detected capacity change from 0 to 64 11:20:20 executing program 3: syz_mount_image$bfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200000, &(0x7f00000003c0)=ANY=[], 0x1, 0xab, &(0x7f0000002280)="$eJzs0b1JxWAYBeDzXbj+NFnAwg2yg1vYhpRJlyoScCJXcYRsYJHWJhIjimInqBeep3jhfD9w4H18frhKlaz3yfrFMN51TT+M6Zo+H85e5+U2DuG0bRssSS6SXFd7frrZ78rx7dEytXNJOy9T+5ddAQCAnzmk/pRL6veDY26/+XH+G7UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/o2XAAAA///lACD/") (fail_nth: 8) 11:20:21 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(0x0, 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:21 executing program 2: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 32) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) (rerun: 32) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async, rerun: 32) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (rerun: 32) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) (async) r2 = creat(&(0x7f0000002640)='./bus\x00', 0x1) r3 = openat$cgroup_subtree(r2, &(0x7f0000000540), 0x2, 0x0) fstat(r3, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000002780)='./file1\x00', &(0x7f00000005c0), 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB='nfs_export=off,xino=on,xino=off,nfs_export=off,nfs_export=on,index=on,xino=auto,obj_user=,seclabel,fsname=-+(^)/[,fowner<', @ANYRESDEC=r4, @ANYBLOB='0x0}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000002280), 0x2a02000, &(0x7f0000002380)={[{@metacopy_off}, {@metacopy_off}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@obj_role={'obj_role', 0x3d, '&,]\''}}, {@subj_user={'subj_user', 0x3d, '/dev/loop'}}, {@smackfshat}, {@euid_eq={'euid', 0x3d, r5}}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) 11:20:21 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") (async) open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/cgroups\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000002280)='--\x00', &(0x7f00000022c0)='/dev/loop', 0x0) (async) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) (async) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 471.921176][T13745] NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds [ 471.952794][T13723] ------------[ cut here ]------------ [ 471.958318][T13723] kernel BUG at mm/mmap.c:340! [ 471.973124][T13747] loop2: detected capacity change from 0 to 64 [ 471.981964][T13748] loop4: detected capacity change from 0 to 64 [ 471.993786][T13746] FAULT_INJECTION: forcing a failure. [ 471.993786][T13746] name failslab, interval 1, probability 0, space 0, times 0 [ 472.006891][ T27] audit: type=1800 audit(1688296821.190:688): pid=13751 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1976 res=0 errno=0 [ 472.022599][T13723] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 472.033211][T13723] CPU: 0 PID: 13723 Comm: syz-executor.5 Not tainted 6.4.0-syzkaller-10096-gdfab92f27c60 #0 [ 472.043267][T13723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 472.053310][T13723] RIP: 0010:validate_mm+0x4ee/0x500 [ 472.058511][T13723] Code: 48 89 df e8 74 90 12 00 eb 93 e8 bd e0 b9 ff 48 c7 c7 a0 80 14 8b 89 de 44 89 f2 e8 3c af e5 08 48 8b 7c 24 28 e8 72 97 fa ff <0f> 0b e8 7b ee e7 08 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa [ 472.078277][T13723] RSP: 0018:ffffc9001647f9a0 EFLAGS: 00010282 [ 472.084334][T13723] RAX: 0000000000000330 RBX: 000000000000001f RCX: 2e7588d56f815600 [ 472.092294][T13723] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 472.100251][T13723] RBP: ffffc9001647fad0 R08: ffffffff816f481c R09: 1ffff92002c8fe98 [ 472.108213][T13723] R10: dffffc0000000000 R11: fffff52002c8fe99 R12: dffffc0000000000 [ 472.116170][T13723] R13: ffffc9001647fa20 R14: 000000000000001b R15: 00007ffc8d1f5000 [ 472.124135][T13723] FS: 00007f1d5fb29700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 472.133052][T13723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 472.139625][T13723] CR2: 00007f55b759afc0 CR3: 0000000021b2a000 CR4: 00000000003506f0 [ 472.147589][T13723] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 472.155561][T13723] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 472.163528][T13723] Call Trace: [ 472.166798][T13723] [ 472.169720][T13723] ? __die_body+0x5e/0xa0 [ 472.174074][T13723] ? die+0x87/0xb0 [ 472.177785][T13723] ? do_trap+0x11e/0x350 [ 472.182016][T13723] ? validate_mm+0x4ee/0x500 [ 472.186597][T13723] ? validate_mm+0x4ee/0x500 [ 472.191182][T13723] ? do_error_trap+0x141/0x1f0 [ 472.195931][T13723] ? validate_mm+0x4ee/0x500 [ 472.200513][T13723] ? do_int3+0x30/0x30 [ 472.204568][T13723] ? report_bug+0x3e4/0x500 [ 472.209150][T13723] ? handle_invalid_op+0x2c/0x40 [ 472.214073][T13723] ? validate_mm+0x4ee/0x500 [ 472.218653][T13723] ? exc_invalid_op+0x33/0x50 [ 472.223320][T13723] ? asm_exc_invalid_op+0x1a/0x20 [ 472.228332][T13723] ? __wake_up_klogd+0xcc/0x100 [ 472.233176][T13723] ? validate_mm+0x4ee/0x500 [ 472.237758][T13723] ? vma_complete+0xb40/0xb40 [ 472.242425][T13723] ? __up_read+0x2bd/0x690 [ 472.246845][T13723] do_vmi_align_munmap+0x13b1/0x15c0 [ 472.252130][T13723] ? do_vmi_munmap+0x2d0/0x2d0 [ 472.256904][T13723] ? mas_find+0x573/0x5c0 [ 472.261227][T13723] do_vmi_munmap+0x24d/0x2d0 [ 472.265818][T13723] __vm_munmap+0x230/0x450 [ 472.270230][T13723] ? vm_munmap+0x20/0x20 [ 472.274466][T13723] ? lockdep_hardirqs_on_prepare+0x43c/0x7a0 [ 472.280442][T13723] ? syscall_enter_from_user_mode+0x32/0x230 [ 472.286413][T13723] ? lockdep_hardirqs_on+0x98/0x140 [ 472.291604][T13723] __x64_sys_munmap+0x69/0x80 [ 472.296275][T13723] do_syscall_64+0x41/0xc0 [ 472.300685][T13723] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 472.306568][T13723] RIP: 0033:0x7f1d5ee8c467 [ 472.310972][T13723] Code: 00 00 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb 85 66 2e 0f 1f 84 00 00 00 00 00 90 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 472.330574][T13723] RSP: 002b:00007f1d5fb28f38 EFLAGS: 00000246 ORIG_RAX: 000000000000000b [ 472.338978][T13723] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f1d5ee8c467 [ 472.346940][T13723] RDX: 0000000000008000 RSI: 0000000000008000 RDI: 00007f1d555ff000 [ 472.354904][T13723] RBP: 00007f1d555ff000 R08: 0000000000000000 R09: 0000000000000089 [ 472.362865][T13723] R10: 0000000000008000 R11: 0000000000000246 R12: 0000000000000000 11:20:21 executing program 1: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(&(0x7f0000000040)='./bus\x00', 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) read$FUSE(r1, &(0x7f0000002280)={0x2020}, 0x2020) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11:20:21 executing program 4: syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[], 0x1, 0x8f, &(0x7f0000000140)="$eJzszqGtAlEUBNB5q77aBr6gg9cDpZCV4FAQEiqiFUrYDhBYzBLyMCAxS8g54t5Mxsz5dvpPn0zHZHqz3e3Xq0274Sd1SUqSvySLvuXLsnXl2Y/XwzCWDI8/914AAOBzXepLLql1tjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX+geAAD//42mId8=") open(0x0, 0x14dac2, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f000000c380)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES8], 0x208e24b) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 472.370829][T13723] R13: 00007f1d5fb28fdc R14: 00007f1d5fb28fe0 R15: 0000000020000142 [ 472.378801][T13723] [ 472.381823][T13723] Modules linked in: [ 472.439998][T13758] loop1: detected capacity change from 0 to 64 [ 472.463723][T13760] loop4: detected capacity change from 0 to 64 [ 472.502542][T13723] ---[ end trace 0000000000000000 ]--- [ 472.508205][T13723] RIP: 0010:validate_mm+0x4ee/0x500 [ 472.536097][T13723] Code: 48 89 df e8 74 90 12 00 eb 93 e8 bd e0 b9 ff 48 c7 c7 a0 80 14 8b 89 de 44 89 f2 e8 3c af e5 08 48 8b 7c 24 28 e8 72 97 fa ff <0f> 0b e8 7b ee e7 08 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa [ 472.576146][T13723] RSP: 0018:ffffc9001647f9a0 EFLAGS: 00010282 [ 472.586761][T13723] RAX: 0000000000000330 RBX: 000000000000001f RCX: 2e7588d56f815600 [ 472.598701][T13746] CPU: 0 PID: 13746 Comm: syz-executor.3 Tainted: G D 6.4.0-syzkaller-10096-gdfab92f27c60 #0 [ 472.599944][T13723] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 472.610275][T13746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 472.610291][T13746] Call Trace: [ 472.610297][T13746] [ 472.610303][T13746] dump_stack_lvl+0x1e7/0x2d0 [ 472.610331][T13746] ? nf_tcp_handle_invalid+0x650/0x650 [ 472.610351][T13746] ? panic+0x770/0x770 [ 472.610381][T13746] should_fail_ex+0x3aa/0x4e0 [ 472.610402][T13746] should_failslab+0x9/0x20 [ 472.610419][T13746] slab_pre_alloc_hook+0x59/0x2b0 [ 472.620163][T13723] RBP: ffffc9001647fad0 R08: ffffffff816f481c R09: 1ffff92002c8fe98 [ 472.628473][T13746] kmem_cache_alloc+0x52/0x300 [ 472.628506][T13746] ? vm_area_alloc+0x24/0x1d0 [ 472.628524][T13746] vm_area_alloc+0x24/0x1d0 [ 472.628539][T13746] mmap_region+0xb57/0x2310 [ 472.628567][T13746] ? arch_get_unmapped_area_topdown+0x651/0x7b0 [ 472.628589][T13746] ? file_mmap_ok+0x150/0x150 [ 472.632737][T13723] R10: dffffc0000000000 R11: fffff52002c8fe99 R12: dffffc0000000000 [ 472.634797][T13746] ? cap_mmap_addr+0x162/0x2c0 [ 472.639607][T13723] R13: ffffc9001647fa20 R14: 000000000000001b R15: 00007ffc8d1f5000 [ 472.644997][T13746] do_mmap+0x8cf/0xf80 [ 472.645029][T13746] ? mlock_future_ok+0x100/0x100 [ 472.649560][T13723] FS: 00007f1d5fb29700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 472.653738][T13746] ? ima_file_free+0x4b0/0x4b0 [ 472.653759][T13746] ? lockdep_hardirqs_on+0x98/0x140 [ 472.653795][T13746] vm_mmap_pgoff+0x1db/0x410 [ 472.653824][T13746] ? account_locked_vm+0x220/0x220 [ 472.659460][T13723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 472.663297][T13746] ? syscall_enter_from_user_mode+0x32/0x230 [ 472.663329][T13746] ? ksys_mmap_pgoff+0xdc/0x6d0 [ 472.663358][T13746] do_syscall_64+0x41/0xc0 [ 472.671682][T13723] CR2: 00007f80bc3831b8 CR3: 0000000021b2a000 CR4: 00000000003506e0 [ 472.676055][T13746] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 472.676078][T13746] RIP: 0033:0x7fe4b228c3d2 [ 472.676094][T13746] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 b8 ff ff ff 64 [ 472.676108][T13746] RSP: 002b:00007fe4b2f4af28 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 472.676127][T13746] RAX: ffffffffffffffda RBX: 0000000000000022 RCX: 00007fe4b228c3d2 [ 472.676140][T13746] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 472.681481][T13723] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 472.685290][T13746] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [ 472.685304][T13746] R10: 0000000000000022 R11: 0000000000000246 R12: 00000000000000a9 [ 472.685315][T13746] R13: 00007fe4b2f4afdc R14: 00007fe4b2f4afe0 R15: 0000000020002282 [ 472.685336][T13746] [ 472.879991][T13723] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 472.889124][T13723] Kernel panic - not syncing: Fatal exception [ 472.895468][T13723] Kernel Offset: disabled [ 472.899782][T13723] Rebooting in 86400 seconds..