Warning: Permanently added '10.128.1.106' (ED25519) to the list of known hosts. 2024/02/03 16:02:02 fuzzer started 2024/02/03 16:02:02 dialing manager at 10.128.0.169:30005 2024/02/03 16:02:02 checking machine... 2024/02/03 16:02:02 checking revisions... 2024/02/03 16:02:02 testing simple program... [ 71.516100][ T5071] cgroup: Unknown subsys name 'net' [ 71.653274][ T5071] cgroup: Unknown subsys name 'rlimit' [ 71.856419][ T1240] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.863118][ T1240] ieee802154 phy1 wpan1: encryption failed: -22 [ 73.331948][ T5071] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 73.525023][ T5077] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 73.533035][ T5077] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 73.540625][ T5077] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 73.549288][ T5077] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 73.557058][ T5077] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 73.564565][ T5077] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 73.742155][ T5076] chnl_net:caif_netlink_parms(): no params data found [ 73.827669][ T5076] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.835007][ T5076] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.842385][ T5076] bridge_slave_0: entered allmulticast mode [ 73.849544][ T5076] bridge_slave_0: entered promiscuous mode [ 73.858825][ T5076] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.866203][ T5076] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.873452][ T5076] bridge_slave_1: entered allmulticast mode [ 73.880423][ T5076] bridge_slave_1: entered promiscuous mode [ 73.913804][ T5076] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.925713][ T5076] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.962250][ T5076] team0: Port device team_slave_0 added [ 73.970655][ T5076] team0: Port device team_slave_1 added [ 74.002637][ T5076] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.009624][ T5076] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.035702][ T5076] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.048675][ T5076] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.056943][ T5076] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.082961][ T5076] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.128549][ T5076] hsr_slave_0: entered promiscuous mode [ 74.135230][ T5076] hsr_slave_1: entered promiscuous mode [ 74.279524][ T5076] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 74.292279][ T5076] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 74.302623][ T5076] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 74.313868][ T5076] netdevsim netdevsim0 netdevsim3: renamed from eth3 executing program [ 74.343371][ T5076] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.350844][ T5076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.358619][ T5076] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.365839][ T5076] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.437481][ T5076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.456739][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.465151][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.482289][ T5076] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.496334][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.503485][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.518181][ T56] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.525331][ T56] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.700132][ T5076] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.745500][ T5076] veth0_vlan: entered promiscuous mode [ 74.759083][ T5076] veth1_vlan: entered promiscuous mode [ 74.788693][ T5076] veth0_macvtap: entered promiscuous mode [ 74.804437][ T5076] veth1_macvtap: entered promiscuous mode [ 74.828316][ T5076] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.842163][ T5076] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.855100][ T5076] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.864071][ T5076] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.875004][ T5076] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.884130][ T5076] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.964456][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.974188][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.005514][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.014685][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 2024/02/03 16:02:06 building call list... executing program [ 78.382131][ T5076] syz-executor.0 (5076) used greatest stack depth: 17648 bytes left [ 78.422955][ T1268] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program [ 80.853478][ T1268] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.953778][ T1268] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.169482][ T1268] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.908309][ T5095] can: request_module (can-proto-0) failed. [ 81.957082][ T5095] can: request_module (can-proto-0) failed. [ 82.009621][ T5095] can: request_module (can-proto-0) failed. [ 82.476991][ T1268] hsr_slave_0: left promiscuous mode [ 82.500594][ T1268] hsr_slave_1: left promiscuous mode [ 82.517871][ T1268] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 82.538698][ T1268] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 82.556437][ T1268] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 82.568669][ T1268] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 82.604113][ T1268] bridge_slave_1: left allmulticast mode [ 82.609909][ T1268] bridge_slave_1: left promiscuous mode [ 82.626070][ T1268] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.662312][ T1268] bridge_slave_0: left allmulticast mode [ 82.678289][ T1268] bridge_slave_0: left promiscuous mode [ 82.688601][ T1268] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.732789][ T1268] veth1_macvtap: left promiscuous mode [ 82.738697][ T1268] veth0_macvtap: left promiscuous mode [ 82.762263][ T1268] veth1_vlan: left promiscuous mode [ 82.777312][ T1268] veth0_vlan: left promiscuous mode [ 83.221823][ T1268] team0 (unregistering): Port device team_slave_1 removed [ 83.249967][ T1268] team0 (unregistering): Port device team_slave_0 removed [ 83.267343][ T1268] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 83.290635][ T1268] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface executing program [ 83.364206][ T5095] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 83.451133][ T1268] bond0 (unregistering): Released all slaves [ 84.019779][ T5095] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 87.212875][ T45] cfg80211: failed to load regulatory.db [ 133.294852][ T1240] ieee802154 phy0 wpan0: encryption failed: -22 [ 133.301254][ T1240] ieee802154 phy1 wpan1: encryption failed: -22 2024/02/03 16:03:50 syscalls: 3845 2024/02/03 16:03:50 code coverage: enabled 2024/02/03 16:03:50 comparison tracing: enabled 2024/02/03 16:03:50 extra coverage: enabled 2024/02/03 16:03:50 delay kcov mmap: enabled 2024/02/03 16:03:50 setuid sandbox: enabled 2024/02/03 16:03:50 namespace sandbox: enabled 2024/02/03 16:03:50 Android sandbox: /sys/fs/selinux/policy does not exist 2024/02/03 16:03:50 fault injection: enabled 2024/02/03 16:03:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/02/03 16:03:50 net packet injection: enabled 2024/02/03 16:03:50 net device setup: enabled 2024/02/03 16:03:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2024/02/03 16:03:50 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/02/03 16:03:50 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/02/03 16:03:50 USB emulation: enabled 2024/02/03 16:03:50 hci packet injection: enabled 2024/02/03 16:03:50 wifi device emulation: enabled 2024/02/03 16:03:50 802.15.4 emulation: enabled 2024/02/03 16:03:50 swap file: enabled 2024/02/03 16:03:50 fetching corpus: 0, signal 0/0 (executing program) 2024/02/03 16:03:50 fetching corpus: 0, signal 0/0 (executing program) 2024/02/03 16:03:52 starting 5 fuzzer processes [ 182.011516][ T5077] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 182.021897][ T5077] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 182.036873][ T5077] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 182.046823][ T5439] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 182.062173][ T5439] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 182.078627][ T52] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 182.087754][ T52] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 182.088302][ T5439] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 182.103057][ T5439] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 182.103914][ T52] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 182.123743][ T52] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 182.136870][ T52] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 182.162700][ T4464] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 182.192679][ T5077] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 182.207552][ T4464] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 182.215835][ T5439] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 182.225444][ T4464] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 182.233468][ T4464] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 182.240948][ T4464] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 182.254865][ T52] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 182.263447][ T52] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 182.272304][ T52] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 182.282129][ T52] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 182.283771][ T5440] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 182.303741][ T5440] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 182.311273][ T4464] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 182.322399][ T5440] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 182.329567][ T4464] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 182.345222][ T4464] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 182.352728][ T5440] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 182.789620][ T5441] chnl_net:caif_netlink_parms(): no params data found [ 182.816677][ T5436] chnl_net:caif_netlink_parms(): no params data found [ 182.894620][ T5433] chnl_net:caif_netlink_parms(): no params data found [ 183.038198][ T5441] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.045600][ T5441] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.053778][ T5441] bridge_slave_0: entered allmulticast mode [ 183.061345][ T5441] bridge_slave_0: entered promiscuous mode [ 183.119156][ T5441] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.126456][ T5441] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.136721][ T5441] bridge_slave_1: entered allmulticast mode [ 183.144173][ T5441] bridge_slave_1: entered promiscuous mode [ 183.179364][ T5436] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.187099][ T5436] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.194586][ T5436] bridge_slave_0: entered allmulticast mode [ 183.202570][ T5436] bridge_slave_0: entered promiscuous mode [ 183.283554][ T5436] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.290699][ T5436] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.299336][ T5436] bridge_slave_1: entered allmulticast mode [ 183.306776][ T5436] bridge_slave_1: entered promiscuous mode [ 183.327080][ T5433] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.336728][ T5433] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.344725][ T5433] bridge_slave_0: entered allmulticast mode [ 183.353241][ T5433] bridge_slave_0: entered promiscuous mode [ 183.361490][ T5433] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.368631][ T5433] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.376271][ T5433] bridge_slave_1: entered allmulticast mode [ 183.383380][ T5433] bridge_slave_1: entered promiscuous mode [ 183.392845][ T5441] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.456006][ T5436] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.481575][ T5441] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.526491][ T5436] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.574269][ T5441] team0: Port device team_slave_0 added [ 183.608483][ T5433] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.620528][ T5441] team0: Port device team_slave_1 added [ 183.642402][ T5443] chnl_net:caif_netlink_parms(): no params data found [ 183.657061][ T5436] team0: Port device team_slave_0 added [ 183.666320][ T5433] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.702763][ T5441] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.709890][ T5441] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.737667][ T5441] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.760616][ T5436] team0: Port device team_slave_1 added [ 183.792112][ T5445] chnl_net:caif_netlink_parms(): no params data found [ 183.804877][ T5441] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.811993][ T5441] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.840668][ T5441] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.885480][ T5433] team0: Port device team_slave_0 added [ 183.895788][ T5433] team0: Port device team_slave_1 added [ 184.006335][ T5436] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 184.013443][ T5436] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.040116][ T5436] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 184.052966][ T5436] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 184.059949][ T5436] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.087536][ T5436] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 184.159770][ T5433] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 184.167419][ T5433] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.194503][ T5439] Bluetooth: hci0: command 0x0409 tx timeout [ 184.202282][ T5433] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 184.215576][ T5433] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 184.222584][ T5433] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.248720][ T5433] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 184.259534][ T5439] Bluetooth: hci1: command 0x0409 tx timeout [ 184.270230][ T5441] hsr_slave_0: entered promiscuous mode [ 184.277437][ T5441] hsr_slave_1: entered promiscuous mode [ 184.330998][ T5439] Bluetooth: hci2: command 0x0409 tx timeout [ 184.382480][ T5443] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.389684][ T5443] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.397499][ T5443] bridge_slave_0: entered allmulticast mode [ 184.406261][ T5443] bridge_slave_0: entered promiscuous mode [ 184.414096][ T5439] Bluetooth: hci3: command 0x0409 tx timeout [ 184.420865][ T5077] Bluetooth: hci4: command 0x0409 tx timeout [ 184.449299][ T5445] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.456789][ T5445] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.464311][ T5445] bridge_slave_0: entered allmulticast mode [ 184.472224][ T5445] bridge_slave_0: entered promiscuous mode [ 184.505482][ T5433] hsr_slave_0: entered promiscuous mode [ 184.515786][ T5433] hsr_slave_1: entered promiscuous mode [ 184.522747][ T5433] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 184.530614][ T5433] Cannot create hsr debugfs directory [ 184.541415][ T5443] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.548798][ T5443] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.557107][ T5443] bridge_slave_1: entered allmulticast mode [ 184.564681][ T5443] bridge_slave_1: entered promiscuous mode [ 184.592858][ T5436] hsr_slave_0: entered promiscuous mode [ 184.600279][ T5436] hsr_slave_1: entered promiscuous mode [ 184.606805][ T5436] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 184.614713][ T5436] Cannot create hsr debugfs directory [ 184.620553][ T5445] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.627910][ T5445] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.635759][ T5445] bridge_slave_1: entered allmulticast mode [ 184.643251][ T5445] bridge_slave_1: entered promiscuous mode [ 184.769604][ T5443] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.785735][ T5443] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.797567][ T5445] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.811028][ T5445] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.972999][ T5443] team0: Port device team_slave_0 added [ 184.997973][ T5445] team0: Port device team_slave_0 added [ 185.010708][ T5445] team0: Port device team_slave_1 added [ 185.022967][ T5443] team0: Port device team_slave_1 added [ 185.106622][ T5443] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 185.113988][ T5443] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.141982][ T5443] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 185.164257][ T5443] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 185.171350][ T5443] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.197712][ T5443] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 185.209701][ T5445] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 185.217140][ T5445] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.243925][ T5445] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 185.315022][ T5445] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 185.322210][ T5445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.348231][ T5445] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 185.526382][ T5443] hsr_slave_0: entered promiscuous mode [ 185.533532][ T5443] hsr_slave_1: entered promiscuous mode [ 185.540075][ T5443] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 185.547838][ T5443] Cannot create hsr debugfs directory [ 185.560072][ T5445] hsr_slave_0: entered promiscuous mode [ 185.567902][ T5445] hsr_slave_1: entered promiscuous mode [ 185.574888][ T5445] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 185.588265][ T5445] Cannot create hsr debugfs directory [ 185.773309][ T5441] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 185.786277][ T5441] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 185.834765][ T5441] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 185.885067][ T5441] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 185.983673][ T5436] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 186.192674][ T5436] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 186.215342][ T5436] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 186.247738][ T5436] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 186.261150][ T5439] Bluetooth: hci0: command 0x041b tx timeout [ 186.331581][ T5439] Bluetooth: hci1: command 0x041b tx timeout [ 186.411840][ T5439] Bluetooth: hci2: command 0x041b tx timeout [ 186.490926][ T5439] Bluetooth: hci3: command 0x041b tx timeout [ 186.498734][ T5439] Bluetooth: hci4: command 0x041b tx timeout [ 186.939891][ T5441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.005899][ T5441] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.065795][ T1707] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.073126][ T1707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.116501][ T5436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.124994][ T5443] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 187.139960][ T5443] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 187.213942][ T5443] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 187.248408][ T5443] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 187.266080][ T5088] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.273435][ T5088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.434415][ T5436] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.456154][ T5433] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 187.476603][ T5433] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 187.495998][ T5433] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 187.557996][ T5433] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 187.588885][ T5086] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.596153][ T5086] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.695711][ T5086] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.703429][ T5086] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.858524][ T5445] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 187.890628][ T5445] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 187.923478][ T5445] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 187.998250][ T5445] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 188.135261][ T5443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.239810][ T5443] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.263048][ T5436] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.285860][ T5441] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.306938][ T56] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.314296][ T56] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.331828][ T5439] Bluetooth: hci0: command 0x040f tx timeout [ 188.353045][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.360249][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.411578][ T5439] Bluetooth: hci1: command 0x040f tx timeout [ 188.492134][ T5439] Bluetooth: hci2: command 0x040f tx timeout [ 188.571344][ T5439] Bluetooth: hci4: command 0x040f tx timeout [ 188.578274][ T5439] Bluetooth: hci3: command 0x040f tx timeout [ 188.720018][ T5433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.807770][ T5441] veth0_vlan: entered promiscuous mode [ 188.846582][ T5445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.893145][ T5433] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.927956][ T5441] veth1_vlan: entered promiscuous mode [ 188.958095][ T5436] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.986255][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.993496][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.059673][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.066937][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.155035][ T5445] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.203207][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.210458][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.242154][ T5441] veth0_macvtap: entered promiscuous mode [ 189.277276][ T5443] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.310319][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.317564][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.373687][ T5433] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.393105][ T5441] veth1_macvtap: entered promiscuous mode [ 189.545550][ T5441] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 189.653251][ T5441] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 189.725008][ T5441] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 189.750878][ T5441] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 189.760006][ T5441] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 189.789468][ T5441] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 189.886539][ T5433] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.914709][ T5443] veth0_vlan: entered promiscuous mode [ 190.032973][ T5443] veth1_vlan: entered promiscuous mode [ 190.218341][ T5436] veth0_vlan: entered promiscuous mode [ 190.250530][ T5436] veth1_vlan: entered promiscuous mode [ 190.272231][ T5445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.295658][ T5087] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 190.308911][ T5087] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 190.314561][ T5433] veth0_vlan: entered promiscuous mode [ 190.411507][ T5439] Bluetooth: hci0: command 0x0419 tx timeout [ 190.424096][ T5433] veth1_vlan: entered promiscuous mode [ 190.447682][ T5443] veth0_macvtap: entered promiscuous mode [ 190.491579][ T5439] Bluetooth: hci1: command 0x0419 tx timeout [ 190.518945][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 190.550619][ T5443] veth1_macvtap: entered promiscuous mode [ 190.562032][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 190.572356][ T5439] Bluetooth: hci2: command 0x0419 tx timeout [ 190.661755][ T5439] Bluetooth: hci3: command 0x0419 tx timeout [ 190.667926][ T5439] Bluetooth: hci4: command 0x0419 tx timeout 16:04:02 executing program 2: r0 = epoll_create(0x9) readv(r0, 0x0, 0x0) [ 190.702144][ T5443] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 190.741150][ T5443] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:04:02 executing program 2: r0 = epoll_create(0x9) readv(r0, 0x0, 0x0) [ 190.778921][ T5443] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 190.803616][ T5436] veth0_macvtap: entered promiscuous mode [ 190.873487][ T5443] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 190.895316][ T5443] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.909357][ T5443] batman_adv: batadv0: Interface activated: batadv_slave_1 16:04:02 executing program 2: r0 = epoll_create(0x9) readv(r0, 0x0, 0x0) [ 190.956107][ T5436] veth1_macvtap: entered promiscuous mode [ 191.003084][ T5445] veth0_vlan: entered promiscuous mode [ 191.029107][ T5443] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.043414][ T5443] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 16:04:02 executing program 2: r0 = epoll_create(0x9) readv(r0, 0x0, 0x0) [ 191.053014][ T5443] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.063476][ T5443] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:04:02 executing program 2: r0 = epoll_create(0x9) readv(r0, 0x0, 0x0) [ 191.154686][ T5433] veth0_macvtap: entered promiscuous mode [ 191.176283][ T5433] veth1_macvtap: entered promiscuous mode 16:04:02 executing program 2: r0 = epoll_create(0x9) readv(r0, 0x0, 0x0) [ 191.246831][ T5445] veth1_vlan: entered promiscuous mode [ 191.290195][ T5433] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 191.310699][ T5433] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:04:02 executing program 2: r0 = epoll_create(0x9) readv(r0, 0x0, 0x0) [ 191.335105][ T5433] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 191.353676][ T5433] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.370462][ T5433] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 191.403119][ T5436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 191.429201][ T5436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.440495][ T5436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:04:02 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) [ 191.459900][ T5436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.471647][ T5436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 191.509366][ T5436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:04:03 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) [ 191.553915][ T5436] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 191.635808][ T5433] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 191.649721][ T5433] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.660515][ T5433] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 191.674173][ T5433] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.676273][ T5433] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 191.718466][ T5436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 191.718492][ T5436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.718505][ T5436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 191.718520][ T5436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.718539][ T5436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 191.718554][ T5436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.720410][ T5436] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 191.785104][ T5433] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.785169][ T5433] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.785196][ T5433] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.785222][ T5433] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.792233][ T5436] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.792273][ T5436] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.792304][ T5436] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.792335][ T5436] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.809303][ T5445] veth0_macvtap: entered promiscuous mode [ 191.853563][ T5445] veth1_macvtap: entered promiscuous mode [ 191.905998][ T2417] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 191.906050][ T2417] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 192.039165][ T5445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 192.039190][ T5445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.039202][ T5445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 192.039217][ T5445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.039228][ T5445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 192.039243][ T5445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.039256][ T5445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 192.039271][ T5445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.060439][ T5445] batman_adv: batadv0: Interface activated: batadv_slave_0 16:04:03 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) [ 192.254751][ T5445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 192.269872][ T5445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.280931][ T5445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 192.293667][ T5445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.304266][ T5445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 192.317422][ T5445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.330822][ T5445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 192.342586][ T5445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:04:03 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) [ 192.356063][ T5445] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 192.461773][ T5086] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 192.469662][ T5086] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 192.481585][ T5445] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.501999][ T5445] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 16:04:04 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) [ 192.517622][ T5445] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.527167][ T5445] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.551092][ T31] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 192.591316][ T31] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:04:04 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x183800, 0x0) read(r0, &(0x7f0000000040)=""/89, 0x59) 16:04:04 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) [ 192.714988][ T31] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 192.753386][ T31] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:04:04 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x183800, 0x0) read(r0, &(0x7f0000000040)=""/89, 0x59) 16:04:04 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) [ 192.958298][ T31] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 16:04:04 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x183800, 0x0) read(r0, &(0x7f0000000040)=""/89, 0x59) [ 192.999326][ T31] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 193.046116][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 193.080292][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:04:04 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 193.122061][ T5085] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 193.129940][ T5085] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:04:04 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x183800, 0x0) read(r0, &(0x7f0000000040)=""/89, 0x59) 16:04:04 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x183800, 0x0) read(r0, &(0x7f0000000040)=""/89, 0x59) 16:04:04 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:04:04 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x183800, 0x0) read(r0, &(0x7f0000000040)=""/89, 0x59) 16:04:04 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 193.279997][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 193.301083][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:04:04 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:04:04 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:04 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:04:05 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x183800, 0x0) read(r0, &(0x7f0000000040)=""/89, 0x59) 16:04:05 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:04:05 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 193.648556][ T5671] loop1: detected capacity change from 0 to 128 16:04:05 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:04:05 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:04:05 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:04:05 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:04:05 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:04:05 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) 16:04:06 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:04:06 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) [ 194.771548][ T1240] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.778180][ T1240] ieee802154 phy1 wpan1: encryption failed: -22 16:04:06 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:04:06 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:06 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:04:06 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1, 0x40, 0x0) read$FUSE(r0, &(0x7f0000006100)={0x2020}, 0x2020) 16:04:06 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 195.100374][ T5718] loop1: detected capacity change from 0 to 128 16:04:06 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:06 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:06 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@local}, 0x14) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 195.435689][ T5729] loop3: detected capacity change from 0 to 128 [ 195.445337][ T5731] loop4: detected capacity change from 0 to 128 16:04:09 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:10 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:10 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:10 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:10 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 199.376168][ T5749] loop0: detected capacity change from 0 to 128 [ 199.379900][ T5753] loop1: detected capacity change from 0 to 128 [ 199.435359][ T5755] loop4: detected capacity change from 0 to 128 [ 199.454943][ T5756] loop2: detected capacity change from 0 to 128 [ 199.510074][ T5758] loop3: detected capacity change from 0 to 128 16:04:14 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:16 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:16 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:16 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:16 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 205.221496][ T5776] loop4: detected capacity change from 0 to 128 [ 205.253828][ T5779] loop0: detected capacity change from 0 to 128 [ 205.286394][ T5446] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 205.320904][ T5780] loop3: detected capacity change from 0 to 128 [ 208.082761][ T5791] loop2: detected capacity change from 0 to 128 16:04:19 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 208.182429][ T5784] loop1: detected capacity change from 0 to 128 16:04:20 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:20 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:20 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 209.646120][ T5800] loop0: detected capacity change from 0 to 128 [ 209.824991][ T5806] loop1: detected capacity change from 0 to 128 16:04:21 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 210.090571][ T5446] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 212.182048][ T5804] loop3: detected capacity change from 0 to 128 16:04:23 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:23 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 212.480066][ T5815] loop4: detected capacity change from 0 to 128 [ 212.564804][ T5817] loop2: detected capacity change from 0 to 128 [ 212.656448][ T5819] loop1: detected capacity change from 0 to 128 16:04:27 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:27 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:28 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:28 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 216.711838][ T5831] loop0: detected capacity change from 0 to 128 [ 216.804873][ T5836] loop4: detected capacity change from 0 to 128 [ 216.811640][ T5835] loop1: detected capacity change from 0 to 128 16:04:31 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 220.031741][ T5838] loop2: detected capacity change from 0 to 128 16:04:31 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:31 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:31 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:31 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 220.458996][ T5444] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 220.518183][ T5857] loop1: detected capacity change from 0 to 128 [ 220.530917][ T5792] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 220.561181][ T5854] loop4: detected capacity change from 0 to 128 [ 220.572854][ T5856] loop3: detected capacity change from 0 to 128 [ 220.601291][ T5859] loop0: detected capacity change from 0 to 128 [ 224.959298][ T5861] loop2: detected capacity change from 0 to 128 16:04:36 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:36 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:36 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:36 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 225.506049][ T5877] loop0: detected capacity change from 0 to 128 [ 227.896659][ T5888] loop1: detected capacity change from 0 to 128 16:04:39 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:39 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 228.171679][ T5893] loop3: detected capacity change from 0 to 128 [ 228.186992][ T5892] loop0: detected capacity change from 0 to 128 [ 229.984669][ T5894] loop4: detected capacity change from 0 to 128 16:04:41 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:41 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 230.237247][ T5904] loop2: detected capacity change from 0 to 128 [ 231.720922][ T5434] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 16:04:43 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:43 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 232.000011][ T5913] loop0: detected capacity change from 0 to 128 16:04:43 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 232.077633][ T5917] loop1: detected capacity change from 0 to 128 [ 234.184851][ T5918] loop4: detected capacity change from 0 to 128 16:04:47 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:47 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:47 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) 16:04:47 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 236.208828][ T5434] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 236.273575][ T5935] loop3: detected capacity change from 0 to 128 [ 236.292505][ T5934] loop2: detected capacity change from 0 to 128 [ 236.330882][ T29] INFO: task kworker/u4:6:1268 blocked for more than 144 seconds. [ 236.339249][ T29] Not tainted 6.8.0-rc2-next-20240202-syzkaller #0 [ 236.420579][ T5941] loop1: detected capacity change from 0 to 128 [ 236.455959][ T5943] loop0: detected capacity change from 0 to 128 [ 236.655517][ T5944] loop4: detected capacity change from 0 to 128 16:04:49 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 237.820653][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 16:04:49 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 238.016516][ T29] task:kworker/u4:6 state:D stack:22120 pid:1268 tgid:1268 ppid:2 flags:0x00004000 [ 238.046692][ T29] Workqueue: netns cleanup_net [ 238.351073][ T29] Call Trace: [ 238.946917][ T29] [ 238.987103][ T29] __schedule+0x17df/0x4a40 [ 239.033212][ T29] ? __pfx___schedule+0x10/0x10 [ 239.086648][ T29] ? __pfx_lock_release+0x10/0x10 [ 239.153675][ T29] ? __lock_acquire+0x1346/0x1fd0 [ 239.190868][ T29] ? kthread_data+0x52/0xd0 16:04:50 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 239.223407][ T29] ? wq_worker_sleeping+0x66/0x240 [ 239.284746][ T29] ? schedule+0x90/0x320 [ 239.289091][ T29] schedule+0x14b/0x320 [ 239.293566][ T29] schedule_timeout+0xb0/0x310 [ 239.298399][ T29] ? __pfx_schedule_timeout+0x10/0x10 [ 239.303978][ T29] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 239.310126][ T29] ? wait_for_completion+0x2fe/0x620 [ 239.315533][ T29] ? wait_for_completion+0x2fe/0x620 [ 239.320930][ T29] ? _raw_spin_unlock_irq+0x23/0x50 [ 239.326202][ T29] ? lockdep_hardirqs_on+0x99/0x150 [ 239.331508][ T29] ? wait_for_completion+0x2fe/0x620 [ 239.336854][ T29] wait_for_completion+0x355/0x620 [ 239.343388][ T29] ? __pfx_wait_for_completion+0x10/0x10 [ 239.349096][ T29] ? flush_workqueue_prep_pwqs+0x459/0x4c0 [ 239.364061][ T29] ? check_flush_dependency+0xb2/0x390 [ 239.369616][ T29] __flush_workqueue+0x730/0x1630 [ 239.374781][ T29] ? __pfx___flush_workqueue+0x10/0x10 [ 239.380327][ T29] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 239.390772][ T29] drain_workqueue+0xc9/0x390 [ 239.395530][ T29] destroy_workqueue+0xba/0xc40 [ 239.400533][ T29] ? kobject_put+0x3fd/0x430 [ 239.420827][ T29] bond_destructor+0x4d/0x80 [ 239.425509][ T29] ? __pfx_bond_destructor+0x10/0x10 [ 239.433225][ T29] netdev_run_todo+0xd4f/0xf40 [ 239.443070][ T29] ? __pfx_netdev_run_todo+0x10/0x10 [ 239.460832][ T29] ? unregister_netdevice_queue+0x26b/0x370 [ 239.469307][ T29] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 239.482741][ T29] ? br_dev_delete+0xd4/0x100 [ 239.502892][ T29] default_device_exit_batch+0x975/0x9f0 [ 239.512419][ T29] ? __pfx___might_resched+0x10/0x10 [ 239.529918][ T29] ? __pfx_default_device_exit_batch+0x10/0x10 16:04:51 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 239.539814][ T29] ? __pfx_rdma_dev_exit_net+0x10/0x10 [ 239.555544][ T29] ? cfg802154_pernet_exit+0xc3/0xe0 [ 239.570818][ T29] ? __pfx_default_device_exit_batch+0x10/0x10 [ 239.583983][ T29] cleanup_net+0x775/0xb90 16:04:51 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000b80)='./bus\x00', 0x10802, &(0x7f0000000280)=ANY=[], 0x1, 0x252, &(0x7f0000000780)="$eJzs28tqE28Yx/FfD/9/T7aNp2q76YNudDNovYJQWhADSm3EAwhTMtWQmJSZARMR7Fo33oSbojt3gngDvQt3RZCuunKkmdgmbaVUSCZlvp/N+4RfDs/LMwnvIrP18P2L0mrgrLqh+vtMg9K6dqSM+jWgWF9z7W/U/6vVuq5/KGy/vf/o8Z1sLrewZLaYXb41Z2YTs19fvv545Vs49uDzxJchbWaebv2c+745tTm99Wv5eTGwYmCVamiurVSrobtS9qxQDEqO2b2y5waeFSuB57flq+Xq2lrd3EphfHTN94LA3ErdSl7dwqqFft3cZ26xYo7j2PiocJz8xtKSm026C3SW72fdeUkzh5L8RiINAQCARHH+TzPO/2mwe/5/0vz+tuP8DwAAAAAAAAAAAAAAAAAAAADAabATRZNRFE3+Wf+TGnf4RM3HI5JGJY1JOiNpXNKEpElJGUlnJZ2TdF7SBUkXJU1JuiTpsqTplvdKeq84jPmnG/NPtw7Pf6T5Mcy/R7XcuDss/Viv5Wv5eI3zxdu5hRvWkNl/1Xatlh/Yy2/GubXnQ43rZjefOzIf1rWrcb6bzd/NHchnVOj89lPPsT1Hztdx/pbHVcv1MdueD2pmsGvbwD8K6q9Kbrns+ccVn96d4MmnqIje9EQbRxZST7RBkcYi6V8mdMP+0JPuBAAAAAAAAAAAAAAAAABwEt34O2HSewQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4KDfAQAA///0EQOm") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x16, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x0, &(0x7f0000000700)) prctl$PR_SCHED_CORE(0x3e, 0x3, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x10) socket(0x1e, 0x4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000006b80), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) [ 239.593099][ T29] ? __pfx_cleanup_net+0x10/0x10 [ 239.603946][ T29] ? process_scheduled_works+0x825/0x14f0 [ 239.620812][ T29] process_scheduled_works+0x913/0x14f0 [ 239.626579][ T29] ? __pfx_process_scheduled_works+0x10/0x10 [ 239.636815][ T29] ? assign_work+0x364/0x3d0 [ 239.641787][ T29] worker_thread+0xa60/0x1000 [ 239.646556][ T29] ? __pfx_worker_thread+0x10/0x10 [ 239.651791][ T29] kthread+0x2f0/0x390 [ 239.655912][ T29] ? __pfx_worker_thread+0x10/0x10 [ 239.662076][ T29] ? __pfx_kthread+0x10/0x10 [ 239.666733][ T29] ret_from_fork+0x4b/0x80 [ 239.672432][ T29] ? __pfx_kthread+0x10/0x10 [ 239.677081][ T29] ret_from_fork_asm+0x1a/0x30 [ 239.681970][ T29] [ 239.687590][ T29] [ 239.687590][ T29] Showing all locks held in the system: [ 239.719370][ T29] 3 locks held by kworker/0:0/7: [ 239.735228][ T29] #0: ffff8880b943c758 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 [ 239.747831][ T29] #1: ffff8880b9428988 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x441/0x770 [ 239.764835][ T29] #2: ffff8880b9429698 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x120/0x260 [ 239.774794][ T29] 1 lock held by khungtaskd/29: [ 239.779697][ T29] #0: ffffffff8e130d60 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x2a0 [ 239.796051][ T29] 3 locks held by kworker/u4:6/1268: [ 239.802153][ T29] #0: ffff888015acd948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x825/0x14f0 [ 239.814258][ T29] #1: ffffc9000514fd20 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x825/0x14f0 [ 239.829072][ T29] #2: ffffffff8f36da50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf5/0xb90 [ 239.838915][ T29] 2 locks held by getty/4827: [ 239.844021][ T29] #0: ffff88802ab640a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 239.855460][ T29] #1: ffffc90002f162f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6b5/0x1e10 [ 239.867708][ T29] 2 locks held by dhcpcd/5279: [ 239.872926][ T29] #0: ffff8880637f0810 (&sb->s_type->i_mutex_key#10){+.+.}-{3:3}, at: sock_close+0x90/0x240 [ 239.885919][ T29] #1: ffffffff8e1360f8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x39a/0x820 [ 239.898467][ T29] 3 locks held by dhcpcd-run-hook/5968: [ 239.909169][ T29] #0: ffff8880b953c758 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 [ 239.926101][ T29] #1: ffff8880b9528988 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x441/0x770 [ 239.947178][ T29] #2: ffff888017f78038 (&sig->wait_chldexit){....}-{2:2}, at: __wake_up_common_lock+0x25/0x1e0 [ 239.992917][ T29] [ 239.995310][ T29] ============================================= [ 239.995310][ T29] [ 240.047489][ T29] NMI backtrace for cpu 0 [ 240.051980][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.8.0-rc2-next-20240202-syzkaller #0 [ 240.061390][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 240.071481][ T29] Call Trace: [ 240.074873][ T29] [ 240.077831][ T29] dump_stack_lvl+0x1e7/0x2e0 [ 240.082561][ T29] ? __pfx_dump_stack_lvl+0x10/0x10 [ 240.087814][ T29] ? __pfx__printk+0x10/0x10 [ 240.092455][ T29] ? vprintk_emit+0x608/0x720 [ 240.097263][ T29] ? __pfx_vprintk_emit+0x10/0x10 [ 240.102351][ T29] nmi_cpu_backtrace+0x49c/0x4d0 [ 240.104011][ T5973] loop4: detected capacity change from 0 to 128 [ 240.107321][ T29] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 240.119044][ T29] ? _printk+0xd5/0x120 [ 240.123243][ T29] ? __pfx__printk+0x10/0x10 [ 240.127876][ T29] ? __wake_up_klogd+0xcc/0x110 [ 240.132772][ T29] ? __pfx__printk+0x10/0x10 [ 240.137408][ T29] ? __rcu_read_unlock+0xa1/0x110 [ 240.142568][ T29] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 240.148596][ T29] nmi_trigger_cpumask_backtrace+0x198/0x320 [ 240.154631][ T29] watchdog+0xfb0/0xff0 [ 240.158841][ T29] ? watchdog+0x1ea/0xff0 [ 240.163211][ T5977] loop3: detected capacity change from 0 to 128 [ 240.163219][ T29] ? __pfx_watchdog+0x10/0x10 [ 240.174898][ T29] kthread+0x2f0/0x390 [ 240.179024][ T29] ? __pfx_watchdog+0x10/0x10 [ 240.180923][ T5982] loop1: detected capacity change from 0 to 128 [ 240.183724][ T29] ? __pfx_kthread+0x10/0x10 [ 240.183758][ T29] ret_from_fork+0x4b/0x80 [ 240.199056][ T29] ? __pfx_kthread+0x10/0x10 [ 240.203693][ T29] ret_from_fork_asm+0x1a/0x30 [ 240.208518][ T29] [ 240.209880][ T5980] loop2: detected capacity change from 0 to 128 [ 240.213355][ T29] Sending NMI from CPU 0 to CPUs 1: [ 240.223612][ C1] NMI backtrace for cpu 1 [ 240.223625][ C1] CPU: 1 PID: 5982 Comm: syz-executor.1 Not tainted 6.8.0-rc2-next-20240202-syzkaller #0 [ 240.223642][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 240.223651][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 [ 240.223683][ C1] Code: 89 fb e8 23 00 00 00 48 8b 3d 64 d1 1a 0c 48 89 de 5b e9 63 84 57 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 00 bd 03 00 65 8b 15 70 ec [ 240.223697][ C1] RSP: 0018:ffffc90009f5edc0 EFLAGS: 00000202 [ 240.223712][ C1] RAX: 0000000000000002 RBX: ffffc90009f60000 RCX: ffff88801ce80000 [ 240.223723][ C1] RDX: ffff88801ce80000 RSI: ffffc90009f5f7e0 RDI: ffffc90009f5f960 [ 240.223735][ C1] RBP: ffffc90009f5eea0 R08: ffffffff81408d65 R09: ffffffff814088df [ 240.223747][ C1] R10: 0000000000000003 R11: ffff88801ce80000 R12: ffffc90009f5f960 [ 240.223758][ C1] R13: dffffc0000000000 R14: ffffc90009f58000 R15: ffffc90009f5f968 [ 240.223771][ C1] FS: 00007fa2fae326c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 [ 240.223785][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 240.223796][ C1] CR2: 00007f961e2ef772 CR3: 000000002b8c0000 CR4: 00000000003506f0 [ 240.223810][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 240.223819][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 240.223828][ C1] Call Trace: [ 240.223834][ C1] [ 240.223839][ C1] ? nmi_cpu_backtrace+0x3c2/0x4d0 [ 240.223864][ C1] ? __pfx_lock_acquire+0x10/0x10 [ 240.223882][ C1] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 240.223900][ C1] ? nmi_handle+0x2a/0x580 [ 240.223925][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 240.223945][ C1] ? nmi_handle+0x14f/0x580 [ 240.223961][ C1] ? nmi_handle+0x2a/0x580 [ 240.223978][ C1] ? __pfx___sanitizer_cov_trace_pc+0x10/0x10 [ 240.224006][ C1] ? default_do_nmi+0x63/0x160 [ 240.224026][ C1] ? exc_nmi+0x121/0x210 [ 240.224045][ C1] ? end_repeat_nmi+0xf/0x53 [ 240.224065][ C1] ? unwind_next_frame+0x196f/0x2a00 [ 240.224090][ C1] ? unwind_next_frame+0x1df5/0x2a00 [ 240.224116][ C1] ? __pfx___sanitizer_cov_trace_pc+0x10/0x10 [ 240.224141][ C1] ? __pfx___sanitizer_cov_trace_pc+0x10/0x10 [ 240.224168][ C1] ? __pfx___sanitizer_cov_trace_pc+0x10/0x10 [ 240.224199][ C1] [ 240.224203][ C1] [ 240.224208][ C1] unwind_next_frame+0x1e5b/0x2a00 [ 240.224238][ C1] ? ext4_map_blocks+0xa2f/0x1cd0 [ 240.224256][ C1] ? ext4_map_blocks+0xa2f/0x1cd0 [ 240.224270][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 240.224294][ C1] arch_stack_walk+0x151/0x1b0 [ 240.224314][ C1] ? ext4_getblk+0x1fa/0x850 [ 240.224332][ C1] stack_trace_save+0x118/0x1d0 [ 240.224355][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 240.224379][ C1] ? mark_lock+0x9a/0x350 [ 240.224397][ C1] ? ext4_mb_new_blocks+0x13f7/0x4b60 [ 240.224415][ C1] kasan_save_track+0x3f/0x80 [ 240.224431][ C1] ? kasan_save_track+0x3f/0x80 [ 240.224446][ C1] ? kasan_save_free_info+0x40/0x50 [ 240.224469][ C1] ? poison_slab_object+0xa6/0xe0 [ 240.224485][ C1] ? __kasan_slab_free+0x37/0x60 [ 240.224501][ C1] ? kmem_cache_free+0x102/0x2a0 [ 240.224524][ C1] ? ext4_mb_new_blocks+0x13f7/0x4b60 [ 240.224540][ C1] ? ext4_ext_map_blocks+0x1df9/0x7160 [ 240.224561][ C1] ? ext4_map_blocks+0xa2f/0x1cd0 [ 240.224603][ C1] kasan_save_free_info+0x40/0x50 [ 240.224626][ C1] poison_slab_object+0xa6/0xe0 [ 240.224644][ C1] ? ext4_mb_new_blocks+0x13f7/0x4b60 [ 240.224661][ C1] __kasan_slab_free+0x37/0x60 [ 240.224678][ C1] kmem_cache_free+0x102/0x2a0 [ 240.224706][ C1] ext4_mb_new_blocks+0x13f7/0x4b60 [ 240.224730][ C1] ? rcu_is_watching+0x15/0xb0 [ 240.224745][ C1] ? trace_kmalloc+0x1f/0xb0 [ 240.224766][ C1] ? __kmalloc+0x24f/0x4a0 [ 240.224788][ C1] ? ext4_find_extent+0x36c/0xde0 [ 240.224811][ C1] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 240.224828][ C1] ? ext4_ext_search_right+0x4ab/0x860 [ 240.224849][ C1] ? ext4_ext_check_overlap+0x180/0x5b0 [ 240.224873][ C1] ? ext4_inode_to_goal_block+0x317/0x450 [ 240.224894][ C1] ext4_ext_map_blocks+0x1df9/0x7160 [ 240.224916][ C1] ? mark_lock+0x9a/0x350 [ 240.224949][ C1] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 240.224984][ C1] ? __down_write_common+0x162/0x200 [ 240.225009][ C1] ? ext4_es_lookup_extent+0x60a/0xa50 [ 240.225030][ C1] ext4_map_blocks+0xa2f/0x1cd0 [ 240.225053][ C1] ? __pfx_ext4_map_blocks+0x10/0x10 [ 240.225078][ C1] ext4_getblk+0x1fa/0x850 [ 240.225096][ C1] ? __pfx_ext4_getblk+0x10/0x10 [ 240.225110][ C1] ? __pfx_ext4_initxattrs+0x10/0x10 [ 240.225138][ C1] ? rcu_is_watching+0x15/0xb0 [ 240.225155][ C1] ext4_bread+0x2e/0x180 [ 240.225171][ C1] ext4_append+0x327/0x5c0 [ 240.225203][ C1] ? __pfx_ext4_append+0x10/0x10 [ 240.225234][ C1] ext4_init_new_dir+0x33e/0xa30 [ 240.225263][ C1] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 240.225293][ C1] ext4_mkdir+0x4f7/0xcf0 [ 240.225322][ C1] ? __pfx_ext4_mkdir+0x10/0x10 [ 240.225349][ C1] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 240.225365][ C1] ? security_inode_mkdir+0xc2/0x110 [ 240.225385][ C1] vfs_mkdir+0x2f9/0x4b0 [ 240.225405][ C1] do_mkdirat+0x264/0x3a0 [ 240.225423][ C1] ? __pfx_do_mkdirat+0x10/0x10 [ 240.225440][ C1] ? getname_flags+0x1fe/0x4f0 [ 240.225464][ C1] __x64_sys_mkdirat+0x89/0xa0 [ 240.225480][ C1] do_syscall_64+0xfb/0x240 [ 240.225508][ C1] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 240.225525][ C1] RIP: 0033:0x7fa2fa07c8a7 [ 240.225538][ C1] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 240.225550][ C1] RSP: 002b:00007fa2fae31ef8 EFLAGS: 00000202 ORIG_RAX: 0000000000000102 [ 240.225566][ C1] RAX: ffffffffffffffda RBX: 00007fa2fae31f80 RCX: 00007fa2fa07c8a7 [ 240.225577][ C1] RDX: 00000000000001ff RSI: 0000000020000b80 RDI: 00000000ffffff9c [ 240.225587][ C1] RBP: 0000000020000240 R08: 0000000000000000 R09: 000000000000024c [ 240.225597][ C1] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000b80 [ 240.225606][ C1] R13: 00007fa2fae31f40 R14: 0000000000000252 R15: 0000000020000280 [ 240.225626][ C1] [ 240.937353][ T29] Kernel panic - not syncing: hung_task: blocked tasks [ 240.944266][ T29] CPU: 1 PID: 29 Comm: khungtaskd Not tainted 6.8.0-rc2-next-20240202-syzkaller #0 [ 240.953680][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 240.963769][ T29] Call Trace: [ 240.967075][ T29] [ 240.970038][ T29] dump_stack_lvl+0x1e7/0x2e0 [ 240.974770][ T29] ? __pfx_dump_stack_lvl+0x10/0x10 [ 240.980016][ T29] ? __pfx__printk+0x10/0x10 [ 240.984659][ T29] ? vscnprintf+0x5d/0x90 [ 240.989031][ T29] panic+0x349/0x860 [ 240.992980][ T29] ? nmi_trigger_cpumask_backtrace+0x244/0x320 [ 240.999180][ T29] ? __pfx_panic+0x10/0x10 [ 241.003638][ T29] ? tick_nohz_tick_stopped+0x7b/0xc0 [ 241.009137][ T29] ? __irq_work_queue_local+0x137/0x3e0 [ 241.014725][ T29] ? preempt_schedule_thunk+0x1a/0x30 [ 241.020133][ T29] ? nmi_trigger_cpumask_backtrace+0x244/0x320 [ 241.026327][ T29] ? nmi_trigger_cpumask_backtrace+0x2d4/0x320 [ 241.032708][ T29] ? nmi_trigger_cpumask_backtrace+0x2d9/0x320 [ 241.038910][ T29] watchdog+0xfef/0xff0 [ 241.043106][ T29] ? watchdog+0x1ea/0xff0 [ 241.047568][ T29] ? __pfx_watchdog+0x10/0x10 [ 241.052293][ T29] kthread+0x2f0/0x390 [ 241.056948][ T29] ? __pfx_watchdog+0x10/0x10 [ 241.061671][ T29] ? __pfx_kthread+0x10/0x10 [ 241.066324][ T29] ret_from_fork+0x4b/0x80 [ 241.070793][ T29] ? __pfx_kthread+0x10/0x10 [ 241.075429][ T29] ret_from_fork_asm+0x1a/0x30 [ 241.080271][ T29] [ 241.083697][ T29] Kernel Offset: disabled [ 241.088033][ T29] Rebooting in 86400 seconds..