e9a77e70e7a998772b6de720230a40b7a5796af6188c800b7fa06c54dd6be660a050781f8e03edae98532fef635dee9917145d831519e4b1e432ad926225bc4922214658cd0615760e1aa90b1c371811e475cbb69a3ee5392336afd2b8accfc204754ef95b362b0b2a229f1857a118c74cde213571b42f3a6340cd0b165712d7b47532e65a299d2d0c9a5661adfac383b8bd2a3fa625fec436516a9147be525f05577e485dd3d70076d94d2fddfee253963e4d7f9e9af4b3948a6757033ab65cbaabe09e4c2ee4e2803b97c84a109a4aa82ed72a1994c7ac159e7e6f5c26c11728ef65503127866a4c668379f82e8db5b8934f479aaf5df687bcc7933633471ab79443d69740cd880a5375e5ece1b05c41ccb70c7ef718fcb3667260f93b4c24478ed1c2112d3fa959b421c7e4e8bd75efc1014f6c8f69b1dd7993c4d04700a475118536de33b142f1f6b21a349527ffc7ef678a7b567c78192d0cf1c1ef95bb2665eaca4f2e63a0c8ed6d5955b26931d98b8b190c36b54c6f8ae670e706a97965dec5881b070fb1341aa47ee181da6f85681c21b1bad7f8191881d920983c2ff0e523adaf3123b0773d561859a54a6a77c0eccccfef8abb808120ce27c43476b1c978985ae42c680147f092502bbb1f0e37570f876db7215b68ff453eee673519cb1d0adfcfcc477ed5663955e7d20228d0bdcb9a5a855c6a7eac601c79d91ba01f1d8575b721951e908fa72c295dcea1eb57531748875713cc6a32b3712e701b22b15d3e53337fff2271ce43c8023cab1c26130b017949a16e213e8186e6df3a1b7ba3dd63c668c3f00542133cd30546fe519ee1dcb40f487066d2e6118e8f96705abe25f288789f38bcf8eb695e16a2c00e61f5ad1593d3c33e150ecf1d6f5a561b9698bca30a19cb71572146ff2dc771b5ae9f0e26ef2491f93d8605df6d849f4cce05e4687a5a4ed4cafb51ee94ed070aa9bbc9ea3edcbe457b518cebfa3d206dac8ec464c9a4ebc74bd951e6c38f197a915fa7b25d9d82fc2fccc36c782a249e79d73be2fa17b5929c723b88cda6b7b5e09e988ce68714fb650d8c394ca3608f101a9fb203a4c85273609343264b8e0dffd91be57f04ad2b845ac0a3b525a5160dbfd1e467f55ffb4f2543acb63855434ba7e6721aaa18c7497a6966809c0732f72a23f0de99e285a798cdfd6a59324a0969860715a06e99b338aaf99aa88d2198b99970f7d5efb123c4a66dc05c4d8cc9a53eff3bdf01a1a3202e63fe4f79a634279d95a574921f9f25466f47f59b230dbc34fd205ba57815f26e7083bd90419e21eb643f5ca893e2405118d5d6ac3dc2bdf5974cec29c824826c8197674096aa911d04fad7d149d82f6aa32c4a07ab2dcaceb575c83969e34410c4448b6cae5282cb5ca2449185985f68f66831f1eda1a722e1d036565034bf340c02999eb334ae5b79b2ca556511c2490413dd3d551a47e6a10d802d4effa55b4284c5967a479509f4efc41668e40573e6b7054f8ba005efb1fc7ca4ad7b67034fd0e4a52a2d8c78b6814560231b643df0e010422d215c73af5159d2dd51bf805b5d3642a21161e99d7966b7cfb09b1b15a63005b5dc86799b860fd048e130f084c430127494e31678f31daacb2ce8befe6e50dffd7e466448a1db97ad21086ef7cd69241ca9e49b6f18ac0f72ebec5b326ae8ffa38e7137325290fb8a60964f99893cb9924f514d9c17a79a4fbaad0b0bca44502c0ff8b7bfd4f939c6e6edb33e765a6f066a4b2a191b815ed216864e2a9fb5d29de541a092ce67e32093cf3e8d88617f77e37104a7812d056c449d299e5ae7548a1513333870bd74012efbf125b269488ed1f64223d16b2cbc13646ef03e4c016fdc2e68990e6a657600a5730169b33da458a5d736b65bcef0513a5bcd5106a44d33f5c1367e51bfc11c89386c4e492707db87887e5b86c1dba5538fbf5391f5f450a9064b6dfb04f5e7a462277cbf6810e1adf7d64acba3d5e296f5c868cac1cfd76016ca31f52d1169826cf2b4dc548fa348c4c877f9ab4c5cd8fe90452d486d455f3312fa90d3cf031abb0c9ce4fe21496de73c4453770625096a76e7ec42de4e1d12074c68d26a2a143bc762209e77244fb62b8660a62251490e0e68ffc578d27c943632f5462ffe56a0811757d7a2a9ad5c690fd7a2118b5a9d0b266493cef716ef8308d61f4d4c8f2947599294b98f0664c7ba67d5080a67d01dd227e02ed92ac5e06a3a10fed4ea3ea109bf0f23ea44c108a31c56a82c296522328198f30f528927b59a6b38a0738bc055559b83f5be231a9137f16d4fd49611fd0f205afaad2ebe2487abd230a3de428529e18bdf20c9fe6e856607cfa83e5ba0d3eed7f6ab508358604a8e762553a884e07ec2a3b60adf54318bf76d5e30fa066fa81cb0c63452d3f0ae1501f1087ed632aa5e9a325aa84233548e39730f5ff923b663b3ea6698f9a9fb8f24286f50c742c63a6d3fb5c4e00ad0bf6da64cd4c482fbe77ee2860a018028b6cd577efc6e3a65edade5f4cd8f3bafb1825757d7340eb4a077e84fc986cf2a2c2156be5622c32dafbb377546a71c378abca34bf5b8ec888646d7895074d0eaa25070734a9d717860ff0063f2027dad14be5fd110d9ffa851cbd08f49f4f17b226fe37c2cc709d022e1640ccd0fd00980bc4272bd78bb48fe9a7ca57ef8399af0653babbc1b348591efa1eb357f4fc89c31de96a9e8e702a22e7db19bb308f5d46c0b32af7cc", @ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r4, @ANYRESOCT=r5, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5ddcfe8ca03a81158f62018fe5631f402103ca400054b79e66361fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e025ea8cf89436b7b9411cfe8c541a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b546ff990800f66109473f3531c01f000000000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000240)={"2ee3ce170ba0dd2e3894d01225876c1c", r7, 0x0, {0x0, 0x9}, {0x3, 0x4}, 0x400, [0xa, 0x400, 0x4, 0x3, 0xe53, 0xdb2, 0x5, 0x0, 0x0, 0x8, 0x1, 0x2, 0x8, 0x6, 0x6, 0x3]}) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 04:41:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000029c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) pread64(r2, &(0x7f0000000140)=""/62, 0x3e, 0x76) clone3(&(0x7f0000002900)={0x2800000, &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)=0x0, {0x2}, &(0x7f00000007c0)=""/28, 0x1c, &(0x7f0000002880)=""/84, &(0x7f0000000800)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x5, {r0}}, 0x58) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000002980)=r4) sendfile(r1, r0, 0x0, 0x7ffff000) r5 = fspick(r0, &(0x7f00000001c0)='./file0\x00', 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000002a00), 0x40, 0x0) openat$cgroup_ro(r6, &(0x7f0000002a40)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) pwritev2(r5, &(0x7f0000000680)=[{&(0x7f0000000200)="4693df01f0b0479a8d872cb86dafb6b679dc983c88f2121cbacdc88fd824e2aa7cfa19e106898867785637d88e8f20", 0x2f}, {&(0x7f0000000240)="857cb227c172310d96f33c1020f633e1d53c4c90444360e56494da8f54c9811749113afafa245c24cde886a45311ab7b93adf3f86328e60b8b1d496f138e5e7ac19d74b33097f4f95c51e1c3c268a7aeafc3a1cf981d102eb016746c244162ca900771c157cc919885435a7bd242111a4014ef186faee8e0", 0x78}, {&(0x7f00000002c0)="2c1ef1a5b0c39b74d0981c5db4fb1d89f68c36f99fffcf093f78dd5ab15ae4e967bc3e16a84b6ba7162a9fe116311725148b6898c01403c64e2819dda993e0ba5f7d427d252c3a40b4b915e47598a41de3e733e75206b07ba2c4ed0be363d3885d53407f7f61e71ddc6a28bc5f5170a00c7b13d7d416d14dd2ffeef9094797bbf4feb23285479b3dd541dd5f42f57f7ad8b3ef18426edfedf1e5119b63686fca29410991c1f65b4115014cd1da50210eb729183ebdc4029067d076ce9c13b2", 0xbf}, {&(0x7f0000000380)="c27b8690f93edfddb968b3dc452c48267d2114ea28bfaf262b60b257911edad3238496c2f71ac7b0a4e0931002400a812977848701d2d17d9909d6921d7d995fa4a22a4728880607e2bd4e2c5cd9e93cd43cbc7a43617e89c44cb29e8b69f628a138788609768234e47b40ac4dcc3cfb85897cfec36609c7fa834bc6d9621138f9082a502081ae9d0b85bfed93a1aee4612a82b5787a826c58feda276716e9212f838263019b35aef581e1659b4fc8ace958c319801e5c07105c2b9f31f9eccbc90f11d841406583409cdd0a20b11a", 0xcf}, {&(0x7f0000000480)="bbe83f6b077c86ebfce7ecb3c615abf41c657ce9c6cfe4378e2c3add0d59889c71c3e70c88af8ed3fe93bdd0c46da3f4d7f94cf4a2848b43962cecd6b19f4cbd95689783c6465510a08b6ad44dd8c9f6a6919d5080225739f6a593a23fd1060459d30e875e0a118a4528ea9294d30240c096c1fccdf6d9bdd7bf18c2d0aa0a2036d83b20ec2eeeee486b76cced789b4ffd5aeef791157dbda8", 0x99}, {&(0x7f0000000540)="2b5ed050e73c27d80e9f45132c5620b9f07d5d4f19837085bdd55993098e215534534a13483e3f39f15c85ec0214adc0c0a08a11ed1e2948129ec90dfaf7b05ea2201bce82526c41131209a7dbc6", 0x4e}, {&(0x7f00000005c0)="07c291a42ec19749fbe9278d", 0xc}, {&(0x7f0000000600)="8555648a23159f8f687f61ea30bdc5802e5caebbc5f528f4241d61fb84a105d09bf9fcfdfbcde11faeb4dbc89a62b497314ed808fe59e1c377b16bee256e34ca4cd845770b", 0x45}], 0x8, 0xfffffff9, 0x3, 0x11) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000bc0)={0x9, 0x1, {0x7, @usage=0x1, 0x0, 0xd917, 0x5, 0xb3e, 0x0, 0x7, 0x20, @struct={0x81, 0x7f}, 0x5, 0x2c3, [0x3f, 0x7ff, 0x8, 0x91, 0x0, 0x100000000]}, {0x9, @usage=0x8, 0x0, 0x0, 0x0, 0x5b85, 0x7, 0xffffffffffffffc1, 0x20, @struct={0x101}, 0xff, 0x971, [0x8000, 0xcf, 0x101, 0xf4cd, 0x3]}, {0x1, @usage=0x1, 0x0, 0x5, 0x3, 0x800, 0x8, 0x7, 0xc4, @struct={0x8000, 0x6}, 0x2, 0x401, [0xd072, 0x4, 0x80, 0x3, 0x81, 0xc333]}, {0x8, 0x7fff, 0x8}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000002a80)={0x0, 0x800, 0x4, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000002e80)={0x0, 0x0, {0x100, @usage=0x7, 0x0, 0x3, 0x6, 0x200, 0x100000000, 0x3, 0x85, @usage=0x81, 0x1, 0x3ff, [0x6, 0x7ff, 0x5, 0x9, 0x7fffffff, 0x93]}, {0x7ff, @struct={0x7128, 0x1}, r7, 0x4, 0xffffffff80000001, 0x6, 0x3, 0x10001, 0x0, @struct={0x8001, 0x1f}, 0x9, 0x1, [0x2, 0x400, 0x1, 0x3, 0x3, 0x1e5]}, {0xfffffffffffffffa, @usage=0x81, 0x0, 0x2, 0xfffffffffffffff9, 0x80000001, 0x8000, 0x2, 0x55, @usage=0x20, 0x1, 0x7, [0x7f, 0x3, 0x10000, 0x2, 0x1]}, {0x80000001, 0x3, 0x1}}) r8 = dup3(r0, r0, 0x80000) preadv(r8, &(0x7f0000000100)=[{&(0x7f0000000040)=""/167, 0xa7}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x3, 0x101, 0x400) r9 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x60140, 0x40, 0x13}, 0x18) close_range(0xffffffffffffffff, r9, 0x0) [ 133.378031][T11117] loop2: detected capacity change from 0 to 4096 [ 133.394088][T11117] EXT4-fs error (device loop2): ext4_ext_check_inode:460: inode #2: comm syz-executor.2: pblk 0 bad header/extent: too large eh_max - magic f30a, entries 16278, max 46996(4), depth 11919(11919) [ 133.417107][T11127] loop4: detected capacity change from 0 to 1024 [ 133.426039][T11127] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 133.437151][T11129] loop5: detected capacity change from 0 to 6 [ 133.467969][T11129] FAULT_INJECTION: forcing a failure. [ 133.467969][T11129] name failslab, interval 1, probability 0, space 0, times 0 [ 133.480605][T11129] CPU: 0 PID: 11129 Comm: syz-executor.5 Not tainted 5.15.0-rc5-syzkaller #0 [ 133.489360][T11129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.499405][T11129] Call Trace: [ 133.502673][T11129] dump_stack_lvl+0xd6/0x122 [ 133.507254][T11129] dump_stack+0x11/0x1b [ 133.511416][T11129] should_fail+0x23c/0x250 [ 133.515830][T11129] __should_failslab+0x81/0x90 [ 133.520630][T11129] ? __se_sys_mount+0xf7/0x2f0 [ 133.525595][T11129] should_failslab+0x5/0x20 [ 133.530174][T11129] kmem_cache_alloc_trace+0x52/0x320 [ 133.535454][T11129] ? _copy_from_user+0x94/0xd0 [ 133.540229][T11129] __se_sys_mount+0xf7/0x2f0 [ 133.544819][T11129] __x64_sys_mount+0x63/0x70 [ 133.549462][T11129] do_syscall_64+0x44/0xa0 [ 133.550819][ C1] sd 0:0:1:0: tag#7327 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 133.553884][T11129] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.563723][ C1] sd 0:0:1:0: tag#7327 CDB: opcode=0xe5 (vendor) [ 133.569561][T11129] RIP: 0033:0x7f487d934faa [ 133.575898][ C1] sd 0:0:1:0: tag#7327 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 133.580253][T11129] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.589274][ C1] sd 0:0:1:0: tag#7327 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 133.608843][T11129] RSP: 002b:00007f487b6aafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:41:01 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="9e324e2c55d978a1ce64c137bac061ef9a01d791c6fb20f9e5e3467caf5486e987d68001fdfafd7f6b29f39670465800"/61], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() wait4(r0, &(0x7f0000000000), 0x8, &(0x7f00000003c0)) rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 133.608865][T11129] RAX: ffffffffffffffda RBX: 0000000020000700 RCX: 00007f487d934faa [ 133.608877][T11129] RDX: 00000000200000c0 RSI: 0000000020000940 RDI: 00007f487b6ab000 [ 133.617892][ C1] sd 0:0:1:0: tag#7327 CDB[20]: ba [ 133.626425][T11129] RBP: 00007f487b6ab040 R08: 00007f487b6ab040 R09: 00000000200000c0 [ 133.626439][T11129] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0 [ 133.645103][T11147] loop3: detected capacity change from 0 to 264192 [ 133.647436][T11129] R13: 0000000020000940 R14: 00007f487b6ab000 R15: 0000000020000080 [ 133.660343][T11117] EXT4-fs (loop2): get root inode failed [ 133.672503][T11127] EXT4-fs error (device loop4): ext4_fill_super:4816: inode #2: comm syz-executor.4: iget: root inode unallocated [ 133.678062][T11117] EXT4-fs (loop2): mount failed [ 133.701116][T11127] EXT4-fs (loop4): get root inode failed [ 133.706768][T11127] EXT4-fs (loop4): mount failed 04:41:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:01 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) (fail_nth: 57) 04:41:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000000100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000000040)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3963f94b78f2ef801000400000000000000000000000900000010", 0x44, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[], 0x13) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x1000f0) [ 133.806400][T11173] loop4: detected capacity change from 0 to 1024 [ 133.814922][T11173] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 133.852608][T11183] loop5: detected capacity change from 0 to 6 [ 133.863652][T11183] FAULT_INJECTION: forcing a failure. [ 133.863652][T11183] name failslab, interval 1, probability 0, space 0, times 0 [ 133.873367][T11173] EXT4-fs error (device loop4): ext4_fill_super:4816: inode #2: comm syz-executor.4: iget: root inode unallocated [ 133.876377][T11183] CPU: 0 PID: 11183 Comm: syz-executor.5 Not tainted 5.15.0-rc5-syzkaller #0 [ 133.891276][T11173] EXT4-fs (loop4): get root inode failed [ 133.896961][T11183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.896974][T11183] Call Trace: [ 133.896980][T11183] dump_stack_lvl+0xd6/0x122 [ 133.902620][T11173] EXT4-fs (loop4): mount failed [ 133.912630][T11183] dump_stack+0x11/0x1b [ 133.928370][T11190] loop2: detected capacity change from 0 to 4096 [ 133.929438][T11183] should_fail+0x23c/0x250 [ 133.929459][T11183] ? getname_flags+0x84/0x3f0 [ 133.929482][T11183] __should_failslab+0x81/0x90 [ 133.929500][T11183] should_failslab+0x5/0x20 [ 133.954066][T11183] kmem_cache_alloc+0x4f/0x300 [ 133.958818][T11183] ? should_fail+0xd6/0x250 [ 133.963346][T11183] getname_flags+0x84/0x3f0 [ 133.967838][T11183] ? should_fail+0xd6/0x250 [ 133.972336][T11183] user_path_at_empty+0x28/0x110 [ 133.977260][T11183] __se_sys_mount+0x217/0x2f0 [ 133.981990][T11183] __x64_sys_mount+0x63/0x70 [ 133.986564][T11183] do_syscall_64+0x44/0xa0 [ 133.990975][T11183] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.996858][T11183] RIP: 0033:0x7f487d934faa [ 134.001257][T11183] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.020938][T11183] RSP: 002b:00007f487b6aafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 134.029393][T11183] RAX: ffffffffffffffda RBX: 0000000020000700 RCX: 00007f487d934faa [ 134.037346][T11183] RDX: 00000000200000c0 RSI: 0000000020000940 RDI: 00007f487b6ab000 [ 134.045473][T11183] RBP: 00007f487b6ab040 R08: 00007f487b6ab040 R09: 00000000200000c0 [ 134.053426][T11183] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0 [ 134.061379][T11183] R13: 0000000020000940 R14: 00007f487b6ab000 R15: 0000000020000080 [ 134.078123][T11190] EXT4-fs error (device loop2): ext4_ext_check_inode:460: inode #2: comm syz-executor.2: pblk 0 bad header/extent: too large eh_max - magic f30a, entries 16278, max 46996(4), depth 11919(11919) [ 134.097426][T11190] EXT4-fs (loop2): get root inode failed 04:41:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 134.103219][T11190] EXT4-fs (loop2): mount failed 04:41:01 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) (fail_nth: 58) [ 134.186718][T11214] loop5: detected capacity change from 0 to 6 [ 134.199882][T11210] loop4: detected capacity change from 0 to 1024 [ 134.207130][T11214] FAULT_INJECTION: forcing a failure. [ 134.207130][T11214] name failslab, interval 1, probability 0, space 0, times 0 [ 134.219794][T11214] CPU: 1 PID: 11214 Comm: syz-executor.5 Not tainted 5.15.0-rc5-syzkaller #0 04:41:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000840)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x0, "2156816c73038c"}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(0xffffffffffffffff, 0xc0286687, &(0x7f0000000040)={0x2, 0xfffffffffffffe01, 0x4d, &(0x7f0000000240)=""/77}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=ANY=[]) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x0, "2156816c73038c"}) ftruncate(0xffffffffffffffff, 0xff) r11 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r11, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x100, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x7f, 0x1, 0x4, 0x6, 0x0, 0x10001, 0x201c8, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x16240, 0x666, 0x0, 0x8, 0x3, 0x9, 0x401, 0x0, 0xfffeffff, 0x0, 0x7ff}, 0x0, 0x6, 0xffffffffffffffff, 0x2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x9, 0x34, 0x20, 0x1, 0x0, 0x8, 0x4000, 0xd, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc9, 0x2, @perf_bp={0xfffffffffffffffd, 0x2}, 0x5000, 0x9, 0x411b3fb6, 0x7, 0x4, 0x8467f340, 0x81, 0x0, 0x401, 0x0, 0xd72}, 0x0, 0x8, r12, 0xa) [ 134.228559][T11214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.235840][T11210] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 134.238693][T11214] Call Trace: [ 134.238702][T11214] dump_stack_lvl+0xd6/0x122 [ 134.238757][T11214] dump_stack+0x11/0x1b [ 134.238774][T11214] should_fail+0x23c/0x250 [ 134.238792][T11214] ? getname_flags+0x84/0x3f0 [ 134.269026][T11214] __should_failslab+0x81/0x90 [ 134.273816][T11214] should_failslab+0x5/0x20 [ 134.278386][T11214] kmem_cache_alloc+0x4f/0x300 [ 134.283163][T11214] ? should_fail+0xd6/0x250 [ 134.287286][T11210] EXT4-fs error (device loop4): ext4_fill_super:4816: inode #2: comm syz-executor.4: iget: root inode unallocated [ 134.287696][T11214] getname_flags+0x84/0x3f0 [ 134.300106][T11210] EXT4-fs (loop4): get root inode failed [ 134.304123][T11214] ? should_fail+0xd6/0x250 [ 134.304144][T11214] user_path_at_empty+0x28/0x110 [ 134.309848][T11210] EXT4-fs (loop4): mount failed [ 134.314326][T11214] __se_sys_mount+0x217/0x2f0 [ 134.328855][T11214] __x64_sys_mount+0x63/0x70 04:41:01 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x40223000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)="d9") clone(0x11020000, &(0x7f0000000140)="a07f01ede7a899d8440ce9e14aae9db972", &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = gettid() tkill(r0, 0x80000001) r1 = gettid() tkill(r1, 0x3a) tkill(0x0, 0x18) clone(0x20088000, 0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)="125940ed0c84ad40b3d9c8b67da7f73a45db0875ba86dd5ba7f4c9bff421efa6e4f1f189888f0650e399c47ba3a7067d1ffbf34a7f2dbba548") ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001b80)) wait4(0x0, 0x0, 0x20000000, &(0x7f0000001c40)) clone(0x840200, 0x0, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="5647efcd77901d4738f05d3b5ee57ba69a206f60222957828a1ff1645cf0a3a7753f9784b10fb4bbdf380ef74aac20d91a66441cdb4271715bb6b678c7048a8b7cfb96bf19ae8694") tkill(0x0, 0x5) clone(0x9c000000, &(0x7f0000001940)="c95864d83105b15c96954c143f6a86ca404bcbd63333621903ede4b6dff292fdb79af3cb6ec3a9b404eeffc1563fdeb3e07946d7c14016480cc13b15832b21e9f05aecd4e2152d4d605d486dc2208ffb3e63b9deab4e76211de18cd20800e35704a127c572a73829d3aacc2ccc820fafd8a4159b6c661a918f0850829e6a0fc0bbca0a7597e6f495c13e18fd879798fd684c2a4b36cc07f120c818831a96f809916236cff97dbf8b21965076734e6af0", &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="7dd81d42526c63d5d7f8c4cbe60a5d81d7bff15177147cb306b33ba54ddadf474df6aee79fbc2eeddda4c2d6c104648f4239e8924a5eddf3edc9606903761367959d32d001614fc7b81803009e316d7befc6f2533131d96ddb9186387f0300d87b101f61139fada159ed6fc27eb7be49dd0d070867dc485a02324d4f") [ 134.333492][T11214] do_syscall_64+0x44/0xa0 [ 134.337914][T11214] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.343806][T11214] RIP: 0033:0x7f487d934faa [ 134.348298][T11214] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.348352][ C0] sd 0:0:1:0: tag#7383 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 134.367908][T11214] RSP: 002b:00007f487b6aafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 134.367929][T11214] RAX: ffffffffffffffda RBX: 0000000020000700 RCX: 00007f487d934faa [ 134.367940][T11214] RDX: 00000000200000c0 RSI: 0000000020000940 RDI: 00007f487b6ab000 [ 134.378261][ C0] sd 0:0:1:0: tag#7383 CDB: opcode=0xe5 (vendor) [ 134.386624][T11214] RBP: 00007f487b6ab040 R08: 00007f487b6ab040 R09: 00000000200000c0 [ 134.386639][T11214] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0 [ 134.386651][T11214] R13: 0000000020000940 R14: 00007f487b6ab000 R15: 0000000020000080 [ 134.432916][ C0] sd 0:0:1:0: tag#7383 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 134.438907][ C1] sd 0:0:1:0: tag#7305 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 134.441960][ C0] sd 0:0:1:0: tag#7383 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 134.441977][ C0] sd 0:0:1:0: tag#7383 CDB[20]: ba [ 134.451766][ C1] sd 0:0:1:0: tag#7305 CDB: opcode=0xe5 (vendor) [ 134.465748][T11147] loop3: detected capacity change from 0 to 264192 [ 134.465852][ C1] sd 0:0:1:0: tag#7305 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 04:41:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 134.487049][T11147] FAT-fs (loop3): Unrecognized mount option "measure" or missing value [ 134.487742][ C1] sd 0:0:1:0: tag#7305 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 134.504981][ C1] sd 0:0:1:0: tag#7305 CDB[20]: ba 04:41:02 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 134.533915][T11250] loop4: detected capacity change from 0 to 1024 [ 134.584397][T11250] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 134.618816][ C1] sd 0:0:1:0: tag#7307 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 04:41:02 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xac, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) socketpair(0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x800) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)='system_u:object_r:ld_so_t:s0\x00', 0x1d, 0x2) lseek(r1, 0x10000, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0xc4800, 0x0) r3 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000740)=[{{&(0x7f0000000640)=@xdp={0x2c, 0x0, r4}, 0x80, 0x0}}], 0x1, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmmsg$sock(r5, &(0x7f0000000740)=[{{&(0x7f0000000200)=@nl=@unspec, 0x80, 0x0, 0xfffffffffffffdab}}], 0x1, 0x20008000) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x12c, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x40010}, 0x4048040) sendfile(r1, r2, 0x0, 0x8400fffffffa) r8 = openat(r2, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r8, 0x0, 0x80000001) [ 134.628688][ C1] sd 0:0:1:0: tag#7307 CDB: opcode=0xe5 (vendor) [ 134.635045][ C1] sd 0:0:1:0: tag#7307 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 134.644103][ C1] sd 0:0:1:0: tag#7307 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 134.653157][ C1] sd 0:0:1:0: tag#7307 CDB[20]: ba [ 134.663979][T11250] EXT4-fs error (device loop4): ext4_fill_super:4816: inode #2: comm syz-executor.4: iget: root inode unallocated 04:41:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) (fail_nth: 59) 04:41:02 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000280), 0x2, &(0x7f00000003c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r2, &(0x7f0000000140)=""/62, 0x3e, 0x76) gettid() r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r4, &(0x7f0000000140)=""/62, 0x3e, 0x76) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, r3, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:02 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) [ 134.732927][T11295] loop5: detected capacity change from 0 to 6 [ 134.733553][ T22] audit: type=1400 audit(1634100062.300:320): avc: denied { mac_admin } for pid=11290 comm="syz-executor.0" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 134.748328][T11295] FAULT_INJECTION: forcing a failure. [ 134.748328][T11295] name failslab, interval 1, probability 0, space 0, times 0 [ 134.762678][T11296] SELinux: Context system_u:object_r:smartcard_device_t: is not valid (left unmapped). [ 134.774245][T11295] CPU: 0 PID: 11295 Comm: syz-executor.5 Not tainted 5.15.0-rc5-syzkaller #0 [ 134.792690][T11295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.802858][T11295] Call Trace: [ 134.806125][T11295] dump_stack_lvl+0xd6/0x122 [ 134.810796][T11295] dump_stack+0x11/0x1b [ 134.814947][T11295] should_fail+0x23c/0x250 [ 134.819416][T11295] __should_failslab+0x81/0x90 [ 134.824266][T11295] ? alloc_fs_context+0x46/0x500 [ 134.829236][T11295] should_failslab+0x5/0x20 [ 134.833727][T11295] kmem_cache_alloc_trace+0x52/0x320 [ 134.839051][T11295] alloc_fs_context+0x46/0x500 [ 134.843868][T11295] ? strncmp+0x34/0x70 [ 134.847921][T11295] fs_context_for_mount+0x1d/0x20 [ 134.852930][T11295] path_mount+0xe0d/0x1d20 [ 134.857385][T11295] __se_sys_mount+0x24b/0x2f0 [ 134.862047][T11295] __x64_sys_mount+0x63/0x70 [ 134.866622][T11295] do_syscall_64+0x44/0xa0 [ 134.871026][T11295] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.876956][T11295] RIP: 0033:0x7f487d934faa [ 134.881352][T11295] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.900943][T11295] RSP: 002b:00007f487b6aafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 134.909386][T11295] RAX: ffffffffffffffda RBX: 0000000020000700 RCX: 00007f487d934faa [ 134.917340][T11295] RDX: 00000000200000c0 RSI: 0000000020000940 RDI: 00007f487b6ab000 [ 134.925296][T11295] RBP: 00007f487b6ab040 R08: 00007f487b6ab040 R09: 00000000200000c0 ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f0000000180)={0xfa7, 0x3, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:smartcard_device_t:s0\x00', 0x25) listen(0xffffffffffffffff, 0xffff13df) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r2, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000000)) [ 134.933251][T11295] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0 [ 134.941232][T11295] R13: 0000000020000940 R14: 00007f487b6ab000 R15: 0000000020000080 [ 134.978853][ C1] sd 0:0:1:0: tag#7308 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 134.988709][ C1] sd 0:0:1:0: tag#7308 CDB: opcode=0xe5 (vendor) [ 134.995060][ C1] sd 0:0:1:0: tag#7308 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 135.004121][ C1] sd 0:0:1:0: tag#7308 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 135.013163][ C1] sd 0:0:1:0: tag#7308 CDB[20]: ba [ 135.018878][T11250] EXT4-fs (loop4): get root inode failed 04:41:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000840)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x0, "2156816c73038c"}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(0xffffffffffffffff, 0xc0286687, &(0x7f0000000040)={0x2, 0xfffffffffffffe01, 0x4d, &(0x7f0000000240)=""/77}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=ANY=[]) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x0, "2156816c73038c"}) ftruncate(0xffffffffffffffff, 0xff) r11 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r11, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x100, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x7f, 0x1, 0x4, 0x6, 0x0, 0x10001, 0x201c8, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x16240, 0x666, 0x0, 0x8, 0x3, 0x9, 0x401, 0x0, 0xfffeffff, 0x0, 0x7ff}, 0x0, 0x6, 0xffffffffffffffff, 0x2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x9, 0x34, 0x20, 0x1, 0x0, 0x8, 0x4000, 0xd, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc9, 0x2, @perf_bp={0xfffffffffffffffd, 0x2}, 0x5000, 0x9, 0x411b3fb6, 0x7, 0x4, 0x8467f340, 0x81, 0x0, 0x401, 0x0, 0xd72}, 0x0, 0x8, r12, 0xa) 04:41:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x3, 0x103382) r1 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000880)={0x0, 0x0, "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", "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"}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x8, @empty, 0x16}, 0x1c) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16", 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) gettid() getpgid(0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000003c80)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYRESHEX, @ANYRES32, @ANYRESOCT, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000001b80)={{}, 0x0, 0x4, @unused=[0x4, 0x1a9e, 0x1, 0x80], @subvolid=0x1}) perf_event_open(&(0x7f0000001b00)={0x5, 0x80, 0x4, 0x2, 0x2, 0x7, 0x0, 0xd73a, 0x52612, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc00, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x8001, 0x3, 0xfffffffd, 0x1, 0x80000000, 0x20, 0x5, 0x0, 0xffff}, 0x0, 0x0, r1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x1e, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x24002da8) 04:41:02 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="08000100000000000005000000000000002e"], 0xe8}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000480), 0x1, &(0x7f00000004c0)) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x2, 0x8}, 0x0, 0x0, 0x0, {}, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') wait4(r0, &(0x7f0000000180), 0x2, &(0x7f00000003c0)) pread64(r3, &(0x7f0000000140)=""/62, 0x3e, 0x76) rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) (fail_nth: 60) 04:41:02 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="080000000000000007002e1e36c4043eb5813431bbea48b03b2273b05101a7f6b24f16c7b8141c3b4f676e2bbb580b3dcd8a8bee39e00cba17735a2e243c5eb9ffe2"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) wait4(r0, &(0x7f00000000c0), 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0xa, &(0x7f0000000240)) 04:41:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 135.024555][T11250] EXT4-fs (loop4): mount failed [ 135.036320][ C0] sd 0:0:1:0: tag#7387 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 135.046190][ C0] sd 0:0:1:0: tag#7387 CDB: opcode=0xe5 (vendor) [ 135.052558][ C0] sd 0:0:1:0: tag#7387 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 135.061597][ C0] sd 0:0:1:0: tag#7387 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 135.070612][ C0] sd 0:0:1:0: tag#7387 CDB[20]: ba [ 135.111793][ C0] sd 0:0:1:0: tag#7398 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 135.121637][ C0] sd 0:0:1:0: tag#7398 CDB: opcode=0xe5 (vendor) [ 135.125301][T11330] loop5: detected capacity change from 0 to 6 [ 135.127978][ C0] sd 0:0:1:0: tag#7398 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 135.136521][T11330] FAT-fs (loop5): Directory bread(block 6) failed [ 135.143066][ C0] sd 0:0:1:0: tag#7398 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 04:41:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x90cc2, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 135.143086][ C0] sd 0:0:1:0: tag#7398 CDB[20]: ba [ 135.221420][T11347] loop4: detected capacity change from 0 to 1024 [ 135.230712][T11347] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 135.242572][T11347] EXT4-fs error (device loop4): ext4_fill_super:4816: inode #2: comm syz-executor.4: iget: root inode unallocated [ 135.263137][T11347] EXT4-fs (loop4): get root inode failed [ 135.268895][T11347] EXT4-fs (loop4): mount failed 04:41:03 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f0000000180)=[{{}, 0x14, 0x2, 0x20}, {{0x77359400}, 0x3, 0x5, 0xb7}, {{0x0, 0x2710}, 0x5, 0x8, 0x1}, {{r0, r1/1000+10000}, 0x16, 0x1f, 0x7}, {{}, 0x5, 0x6}, {{}, 0x1f, 0x6, 0x9}, {{0x77359400}, 0x0, 0x7, 0x80000000}], 0x70) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) ustat(0x12, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000ac0)=[{{&(0x7f0000000640)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="d40000000f010000593e00000b53947de6c4ac3b3bf313d78c0a44d92c532cb7186973a5dee461679e573be3b0bc87d085a3e8cd72d860b4eb75470732771e03b4cc2d361824c3f759183acd41de3706ccfabf1ed6d0f0fefcf60ff566fc2f811add81b743ca4d00a070b96f114ddeef3f8f2df6e6e98e713cd2a0a536c80ac11626615e0a0ba9c72419ede4a4578a3e781754e457d47bd49b8dddd80809276fb65aa3fa3b72af2c82d88314f5a014ed40b9e8016d11351d1137d0e99344fa3e39aab90b0bdb0000000c1000001201000004000000e866226f949530cc2e3e47045097677f00e353cf4c679179a62bdcabdce752bb975cf4a8d534b72eabf395101de9656f946e53f499c42c3adb4dc51a906adf3efa631bb739a1eeb7aeab48622343146cbc8f598cc893cb768b17edd3eae2dc9529eae4f3e933a37426575a2025e82266817ce317de4192ab86c04c4fcaf8de2a1dff5321270678f56be9e1a5288499fbeb16e10a44fbacc5ae3ae7db6f85dbaca261d16c47b3b9744bc1adb9b8c192b6e274766da8b581fd0575f27232f7814b8f12adf98f8b6b25b2adf649c555ef1d75829c314f76a671ef6caf1ba6007a20b6687b5dd5ec90f3f7bfbe51b2fe407a830e0215169dc233c5df1f34dc8e2de462528d3421cf6d90367736169297379890790ffc1f99ec84554cf37436664a58eaa454c7aa484faec5329ece6541584a9d332fa8df5ae7476572bd6498a8bbccc0d36ca071df293439ac7c0c3fb9aee47ad9d199ee50786e18dae51850d47854cff36f22b6a52926d424882f2e3cc44b7e1795dad2324785e1b14ef7e58e2293add58022d6e14c08fe89b916cdbbb6a3357193d008ebb2b4305efdb93232c873273f439922ae6f51a4929c4f7ac6c1be5d5fe9a2f1eb9b87e6232162a52e0999e95993792274e2b7162a38e9cb4b314f8c6d49b3c6894a8afb829df546bb65e48471b11d4b2d11f75db5b9baafbc16baea3135476a9c651986d9e14e2f8e849fe5b09934647421a890c9c377f653f08b7c8ba5faa96bca9791a9235cdb6d1cd6afafe55d66d09a6d88123224fc7e5dd601b28d9f90395a74d2874946938e7a2e990486359dba1477f97e355c50a893e6f47679de777bbd43d32595b54067a52e964a9c49652f1f1ca6ac60de36b0b854793823c3bc89471ecf52b1d0651781f85ca773bf6b0e8861f27976c26be14bfdb60200c919e7021b2855c3a34a80acf9b10651471329c4472e20f7c020fc479f840380cc0b2ced24fa69827bb5d8c1dd00e9005dd65f6cdd1e907aa64eae929d617d96c400"/951], 0x1354}}, {{&(0x7f0000000780)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80, &(0x7f0000000900), 0x0, &(0x7f0000000400)=ANY=[@ANYRES16], 0x98}}], 0x2, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8001}) r4 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4680, 0x0) openat$bsg(0xffffff9c, 0x0, 0x210000, 0x0) r5 = getpid() capset(&(0x7f0000000040)={0x20080522, r5}, 0x0) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r6, &(0x7f0000000080)=""/232, 0xe8) write(r6, &(0x7f0000001400)="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", 0xe00) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x12000000}, 0x0) r8 = signalfd(0xffffffffffffffff, &(0x7f0000000240)={[0x3]}, 0x8) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000000000000000000000400000000000000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00 \x00'/28, @ANYRES32=r8, @ANYBLOB='\x00'/19, @ANYRES32=r2, @ANYBLOB="000000000500"/28, @ANYRES32=r3, @ANYBLOB="00000000000000000000000000000000000000000000000014000000"]) sendfile(r3, r4, 0x0, 0x11c00) 04:41:03 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/sctp\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) recvmsg(r0, &(0x7f00000004c0)={&(0x7f00000001c0)=@caif=@dgm, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/205, 0xcd}, {&(0x7f0000000340)=""/23, 0x17}, {&(0x7f0000000380)=""/31, 0x1f}], 0x3, &(0x7f0000000400)=""/146, 0x92}, 0x10100) set_robust_list(&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x3, &(0x7f0000000140)={&(0x7f0000000100)}}, 0x18) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = getpid() sched_setaffinity(r2, 0x8, &(0x7f0000000500)=0x9) get_robust_list(r2, &(0x7f0000000680)=&(0x7f0000000640)={&(0x7f0000000580)={&(0x7f0000000500)}, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)}}, &(0x7f00000006c0)=0x18) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000040)=0x86, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x240800c1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 04:41:03 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x2, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r1, &(0x7f0000000140)=""/62, 0x3e, 0x76) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x40}, {0x94, 0x0, 0x0, 0x97}, {0x6, 0x0, 0x0, 0xffffffff}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) 04:41:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:03 executing program 2: set_mempolicy(0x2, &(0x7f0000000040)=0x2c7, 0xf2) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @dev}}}], 0x20}, 0x0) [ 135.734325][T11370] loop5: detected capacity change from 0 to 6 [ 135.743228][T11372] loop4: detected capacity change from 0 to 1024 [ 135.743363][T11370] FAT-fs (loop5): Directory bread(block 6) failed 04:41:03 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001640)}], 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x40208000, 0x0, 0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) waitid$P_PIDFD(0x3, r1, &(0x7f0000000180), 0x2, 0x0) 04:41:03 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 135.774940][T11372] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 135.811285][T11372] EXT4-fs error (device loop4): ext4_fill_super:4816: inode #2: comm syz-executor.4: iget: root inode unallocated [ 135.827142][T11372] EXT4-fs (loop4): get root inode failed [ 135.832822][T11372] EXT4-fs (loop4): mount failed [ 135.869702][T11409] loop5: detected capacity change from 0 to 6 [ 135.883514][T11409] FAT-fs (loop5): Directory bread(block 6) failed 04:41:05 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="08000000001b000007002eaee6b4514bca2db7c760a3e5e2f9631a11297c2b73d6dcae8a7cccbe48625fcaaf85bebb1650f8756c6895ea3297643d0f70f66fe0b4b0f7ebf8acc0a7be82156b7619c472ea7c9e68ea25010ed3e35b4e395bffa35f5cc0d6a3727338b6124e0946ef46e54c62cf04497d848b3bf8df"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x58, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xe70}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xcb}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:05 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffc, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x300, 0x0}) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x30) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000a40)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x78) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, 0x0) r3 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x2, @empty, 0x5}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)) clone(0x40808000, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x1) gettid() r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x42200, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xff, 0x1f, 0x0, 0x5a, 0x0, 0x2, 0x80040, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x1, @perf_bp, 0x4, 0x0, 0x8, 0x6, 0x2, 0x6, 0x0, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x10, r4, 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000240)="5345064f458486355fac539824ea77201facc5b0fe54f93c7045c2614898b9d5dc14931308ce140ee306b5f8bd7469954e9808f22445da9a1dcbe0e2e16f6cdb94b5ee1d6e8eb4884e4161387ecec58caeda0e264f23f62af8bc55dadb966ccedd1a8a25fa5ff280e97c018adf5b3f0cbad7922dc51ad0105e6962ba673ac98da109766ab61d04137e877c53d1a44ad8c4d7661bf6ae4015e2770cceb222d46df6cb34df82a218f2c89a2e1b078d99901ef56c21c91adec293a5bfb6066d6b6cd18ba1d6", 0xc4, 0x4000, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000140)="2b9c52a8621801fb18cf342fc1e87aa69aed4f161030af0582ec50a28d40899e7eedc96f88a58cccf946c78e7705c378a1c21032ba821018684394e6e715bc3e078bf813ef2d0abec019322454cdb985a3f763981a0d6312", 0x58, 0x4000000, 0x0, 0x0) 04:41:05 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) gettid() r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000180)={0x13}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000240)={{0x9}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000340)) tkill(r0, 0x7) 04:41:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:05 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x4, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x5, 0x0) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2, 0x0, 0x9}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r5, 0x29, 0x3b, &(0x7f00000005c0)=ANY=[@ANYBLOB="00e193e1a41d28e59803e7a9f69459d7269395402d80e8869430a8dccaed43a8216e11892c027ea74d0c40000000004b5a60840c9a762f720d13efa1bc9e3d826c524de83c24460df69f6d8a97cea0d6746006e61e064a5fae3e7eb3084632412f3e11faad9fb94000f269bf1c059f5ea7d655160900bc274eb970ef369c3789d9dbe093ce6548bdc4"], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000100)={{r2}, 0x0, 0x10000000000000af, 0x4c}) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x2, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r7 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8000, 0x2, 0x2, 0x0, 0x7, 0xff}, 0x20) sendfile(r6, r7, &(0x7f0000000240)=0x208, 0x9) r8 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICADD(r7, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001780)={&(0x7f0000000780)=ANY=[@ANYRESOCT=0x0, @ANYRES16=r8, @ANYBLOB="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", @ANYRESOCT=r5], 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x20008004) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000001a80)=ANY=[@ANYRES32=r4, @ANYRES16=r8, @ANYBLOB="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", @ANYRESHEX=r3], 0x100}, 0x1, 0x0, 0x0, 0x8000}, 0x1) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000a80)={{0x0, 0x70000000, 0x4, 0x800, 0x40040, 0x2113, 0x9, 0x8000, 0xbc, 0x302, 0xffff, 0x7, 0x7fff, 0x2, 0x4}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000600)='E', 0x33fe0}], 0x1}}], 0x1, 0x0) [ 138.102409][T11435] loop5: detected capacity change from 0 to 6 [ 138.105719][T11434] loop4: detected capacity change from 0 to 1024 [ 138.121223][T11435] FAT-fs (loop5): Directory bread(block 6) failed 04:41:05 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) clone(0x32308200, &(0x7f0000000000)="ed50cb65b160755f9497825c384796d0d5d176f5c1d3b87b855a137f24b1a6946ee8886dc695168841ca805815745f503c3506f70ef0b73da6ff09b5c9133697de64c2a22842f455da7d2e843f1409d24e857c5afe2dbc1c6d0ec580a92ebd906821beff592e3f0b62f0d94c16f9eb312adeda12f6", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)="41ae3ba5482159e41a15e34d8760b2dfd64f4997b0559e9de7f6b565eac5b11c09dcf1ba4b79c274f7e77f8edeff5e3a61182cea8135fc425657612c3f56a456d76bab64d5391de37616d569c962480939414cdba4a978858e0b469869aed153f4c5864a03317a3d73d4a29dcc8231bebf44b1713217") wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:05 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x5, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 138.151253][T11434] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 138.191408][T11434] EXT4-fs (loop4): orphan cleanup on readonly fs 04:41:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000200)=0x105, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20, 0x1fffffd, @rand_addr, 0x2}, 0x1c) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000240)={0x1, @time={0x1ff, 0x2}, 0x9}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000300)) close_range(r2, r3, 0x2) getsockopt$sock_timeval(r1, 0x1, 0x42, &(0x7f0000000040), &(0x7f00000000c0)=0x10) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040218, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 04:41:05 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="080000000000010007002e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000000), 0x2, &(0x7f00000003c0)) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 138.197789][T11434] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 138.213760][T11434] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 04:41:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:05 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x6, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 138.262279][T11479] loop5: detected capacity change from 0 to 6 [ 138.281745][T11479] FAT-fs (loop5): Directory bread(block 6) failed 04:41:05 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0xfeb, 0x0, 0x0, {{0x6b}, {@val={0x4, 0x116}, @void, @void}}}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f000001b880)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f000001be00)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f000001bdc0)={&(0x7f000001b8c0)={0x4e4, 0x0, 0x2, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0x40, 0x17}}}}, [@NL80211_ATTR_IE={0x20, 0x2a, [@ht={0x2d, 0x1a, {0x10, 0x0, 0x4, 0x0, {0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x3, 0x1}, 0x1, 0x1, 0x7f}}]}, @NL80211_ATTR_IE={0x188, 0x2a, [@supported_rates={0x1, 0x2, [{0xc, 0x1}, {0x5, 0x1}]}, @preq={0x82, 0x5c, @not_ext={{0x1, 0x1}, 0x5, 0x1, 0x521, @device_b, 0x3f, "", 0x7, 0x9, 0x6, [{{0x1}, @broadcast, 0xfff}, {{}, @device_b}, {{0x0, 0x0, 0x1}, @broadcast, 0x7}, {{0x1}, @broadcast, 0x9}, {{0x0, 0x0, 0x1}, @device_a, 0x7f}, {{0x1, 0x0, 0x1}, @device_a, 0x5}]}}, @dsss={0x3, 0x1, 0x7c}, @ssid={0x0, 0x1, @random="f8"}, @tim={0x5, 0xef, {0x0, 0xdb, 0x62, "d0b60195d42b18cdef7af7865aadd6f5bbaa0c7457a7e84d00e936cdf1a3caaa77e85b9d7d8f6c7a3c383a4493b35a12d225560f86ab13dc8a1819ff34dd41c27ab0a39cb8f3db67291457a147f2728a344d38194ea2a892db2e87c1a6d4e63131ddb1ec812f1da59282ce1a11c6c8c3cc9cdbaf0218bbbebdc92ab196f4b11d0fec32eea9dc38b0bda6e76f6f6540e1d9b162ea675671aea213322d8b6723834141ea10612f98410b5857cd2b0bdf6d5bd7e191f84874168ce1b2e2165761220ce58641eacdc203254321edc17617e7d9bfcb5d6eefac669be4086219d90dd00584c7c41b117e3176bd0bfe"}}, @chsw_timing={0x68, 0x4, {0xac69, 0x6}}, @ibss={0x6, 0x2, 0xfa}, @prep={0x83, 0x1f, @not_ext={{}, 0x8, 0x0, @broadcast, 0x6, "", 0x8, 0x5, @device_a, 0x1}}]}, @NL80211_ATTR_IE={0x77, 0x2a, [@fast_bss_trans={0x37, 0x71, {0x3, 0x1, "cc19a45499e4a35359f7d6ed527156d9", "899d14585f5252b156bad654444bfe4c1e6c8cfe347fc3a9b42e3f6ec1249d3c", "903a7a733efb0874df04031da38c90edb1abc02f852114f0a7a653e11a77b347", [{0x3, 0x1d, "5672b19b09e8d03f55fc82ca27ac7a720d36a6297d4dfcc188fdc8ad56"}]}}]}, @NL80211_ATTR_IE={0x12c, 0x2a, [@tim={0x5, 0x60, {0x1, 0xdf, 0x0, "b137c51cdb61fa50e32a3c11504282fb020c4f90f61d0a6a5287c215017b3266029765bee2d3457267a3d5ce68c1392dc550985c2376ce30838b282dde4a2c02c13e227d523ee828e04a9622d112832aab408ddaf26ea65b8f4ea8667e"}}, @fast_bss_trans={0x37, 0x9c, {0xb7, 0x2, "3df8ef2be70ca986717303ff42055686", "ee37a80d9f9b34f13f2e7345d4c13c718300eb4db9ed0b7372729cec6a511401", "98a5cc23faba2f0edc16637ccfaab140fef9de3a64aa0bedab3e897ceb784109", [{0x2, 0x20, "783729fe5f5a734cf31338bbd2054ef0e344f32aa5767112e497f643743db2e0"}, {0x1, 0x26, "4849a49c94881402290e8e446f95c341229bd9f3a7b6a1bb3c3b434ffd6ff48e478df7ee0100"}]}}, @link_id={0x65, 0x12, {@random="5f33b2caf577", @device_a, @broadcast}}, @link_id={0x65, 0x12, {@initial, @broadcast, @broadcast}}]}, @NL80211_ATTR_IE={0x1b, 0x2a, [@tim={0x5, 0x15, {0x26, 0xed, 0x3f, "70437576d7cb04303455408902567ba913fc"}}]}, @NL80211_ATTR_IE={0x14c, 0x2a, [@mesh_config={0x71, 0x7, {0x1, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0xa7, 0x21}}, @random={0x2, 0x90, "2e798ac038a232d4899c82cfb640af8a4b6cad6711c470b85723994e2a78699b8bc5eef814a23ef7830ba3203f1225ac73b323bee7bc3c0ca1bcb8fc01d53e56beacc5fe49cd0f1016514c3d02b18029d9f534bb99c636b136614f1db0013716824c84672650be83a198a5b88ebafb40f030c44963378c8099fa97bc32ef82da11d8692e163b52836434a1909bf5d9f5"}, @mesh_chsw={0x76, 0x6, {0x0, 0x6c, 0x2e, 0x9}}, @peer_mgmt={0x75, 0x16, {0x1, 0x2, @void, @val=0xf, @val="f4a6652a85386bc614a7bd2c0efe5d3c"}}, @prep={0x83, 0x25, @ext={{}, 0x2, 0x2, @device_b, 0x80, @device_b, 0x6, 0x7f, @device_a, 0x9}}, @fast_bss_trans={0x37, 0x64, {0x81, 0x1, "6c4932af335ce3044c677e00615caec2", "c8bc547c2edefdc1223202019f9764e00b4879ecb1dab8a2f65013c5363721f0", "ee3b1af8c4f8846d9158e820c547a8a463ed5a0110cedd2d3bfded22f844c920", [{0x2, 0x10, "f54925f6fdf0eeeba7a24c14b330f9ce"}]}}]}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x4fcb}]}, 0x4e4}, 0x1, 0x0, 0x0, 0x20044801}, 0x8001) pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002840), 0xffffffffffffffff) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000029c0)={&(0x7f0000002800)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002980)={&(0x7f0000002880)={0xc0, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1f}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x716}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4001}, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x38, r2, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x8804}, 0x24008086) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = gettid() rt_sigqueueinfo(r4, 0xa, &(0x7f00000002c0)) [ 138.331577][T11501] loop5: detected capacity change from 0 to 6 [ 138.334710][T11503] loop4: detected capacity change from 0 to 1024 [ 138.346492][T11501] FAT-fs (loop5): Directory bread(block 6) failed [ 138.395451][T11503] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 138.433774][T11503] EXT4-fs (loop4): orphan cleanup on readonly fs 04:41:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:06 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x7, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:06 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x5, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:06 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setregs(0xd, r0, 0x8, &(0x7f00000003c0)="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") vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000004c0)={0xb0, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x8}}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20000000}, 0xd0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 138.440145][T11503] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 04:41:06 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x5, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:06 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x8, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:06 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000000180)=[{&(0x7f00000003c0)=""/224, 0xe0}, {&(0x7f0000000140)=""/4, 0x4}], 0x2, &(0x7f00000004c0)=""/150, 0x96}, 0x2000) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 138.483248][T11503] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 138.497661][T11539] loop5: detected capacity change from 0 to 6 [ 138.518659][T11539] FAT-fs (loop5): Directory bread(block 6) failed [ 138.523883][T11543] loop2: detected capacity change from 0 to 1024 [ 138.576577][T11543] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 138.586839][T11543] EXT4-fs (loop2): orphan cleanup on readonly fs [ 138.593286][T11543] EXT4-fs error (device loop2): ext4_orphan_get:1419: comm syz-executor.2: bad orphan inode 33554432 04:41:06 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) clone(0x32308200, &(0x7f0000000000)="ed50cb65b160755f9497825c384796d0d5d176f5c1d3b87b855a137f24b1a6946ee8886dc695168841ca805815745f503c3506f70ef0b73da6ff09b5c9133697de64c2a22842f455da7d2e843f1409d24e857c5afe2dbc1c6d0ec580a92ebd906821beff592e3f0b62f0d94c16f9eb312adeda12f6", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)="41ae3ba5482159e41a15e34d8760b2dfd64f4997b0559e9de7f6b565eac5b11c09dcf1ba4b79c274f7e77f8edeff5e3a61182cea8135fc425657612c3f56a456d76bab64d5391de37616d569c962480939414cdba4a978858e0b469869aed153f4c5864a03317a3d73d4a29dcc8231bebf44b1713217") wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:06 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x5, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:06 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000500)=0x9) r2 = getpid() sched_setaffinity(r2, 0x8, &(0x7f0000000500)=0x9) wait4(r2, &(0x7f0000000040), 0x8, &(0x7f0000000540)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0xa, &(0x7f00000002c0)) [ 138.623906][T11574] loop5: detected capacity change from 0 to 6 [ 138.626269][T11543] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 138.636418][T11574] FAT-fs (loop5): Directory bread(block 6) failed 04:41:06 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x9, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000300)) r2 = syz_open_dev$usbmon(&(0x7f0000000100), 0x7, 0x102e00) dup3(r1, r2, 0x80000) pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) r3 = getpid() sched_setaffinity(r3, 0x8, &(0x7f0000000500)=0x9) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x1, 0x9e608213e7cbb736, 0x2, 0x6545, r3}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r4, &(0x7f0000000140)=""/62, 0x3e, 0x76) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xec, 0x0, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x4c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x3e}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x15}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xd9}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9f}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x3}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}]}, 0xec}, 0x1, 0x0, 0x0, 0x814}, 0x4000084) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6e6f636173652c00903219b8b8783eeaf65b04be9863d309fc12b3af0edb3fc56c5a110982b1847287e1fcfdbd18bb32740fc5eff0c855eb4817d2e1bc707f1beba0477113628bf809ce50c4f06b30f4f65cffd6d767e5d65d4c"]) 04:41:06 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r1, &(0x7f0000000140)=""/62, 0x3e, 0x76) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10018}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x6c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8810}, 0x8010) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) [ 138.703005][T11583] loop4: detected capacity change from 0 to 1024 [ 138.739632][T11583] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 04:41:06 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x1ad, &(0x7f0000000580)="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"}}], 0x1c) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000500)=0x9) ptrace$setopts(0x4200, r1, 0x87fc, 0x200028) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000140)={0x0, 0x4, 0x6, 0x1}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 04:41:06 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) ptrace$setregs(0xf, r1, 0xffff, &(0x7f00000003c0)="6d9539341c52f03739d92a788398c50b1f28f742bef75f520138a7c9a67fb698008d4da3f4674e9dd3707a154cc1764793052afaaa926875dcd03e0038ca5b18d3b9bfe0deecbb71037242c0ec24ce9077173f52983154e3f2886e7be47b698f0431e8ea1dc4fd8c65aa55ac7eaf077bcd4ec1334af4634b1cdbbba3f94cfda985b7b9082e5ca5d8250b748e3dbccb567ade54680f916e60b010ad55123bdde8bb998cd2edffbabe3dbf135164695f82355ba44b6f00615ce4783188cf2f94481c") r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) 04:41:06 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) clone(0x32308200, &(0x7f0000000000)="ed50cb65b160755f9497825c384796d0d5d176f5c1d3b87b855a137f24b1a6946ee8886dc695168841ca805815745f503c3506f70ef0b73da6ff09b5c9133697de64c2a22842f455da7d2e843f1409d24e857c5afe2dbc1c6d0ec580a92ebd906821beff592e3f0b62f0d94c16f9eb312adeda12f6", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)="41ae3ba5482159e41a15e34d8760b2dfd64f4997b0559e9de7f6b565eac5b11c09dcf1ba4b79c274f7e77f8edeff5e3a61182cea8135fc425657612c3f56a456d76bab64d5391de37616d569c962480939414cdba4a978858e0b469869aed153f4c5864a03317a3d73d4a29dcc8231bebf44b1713217") wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000840)="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", 0x15d, 0x400}], 0x0, &(0x7f0000013a00)) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) [ 138.747278][T11605] loop5: detected capacity change from 0 to 6 [ 138.757510][T11583] EXT4-fs (loop4): orphan cleanup on readonly fs [ 138.763965][T11583] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 138.792172][T11605] FAT-fs (loop5): Directory bread(block 6) failed 04:41:06 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f00000003c0)={0x1c8, 0x2a, 0x8, 0x70bd2b, 0x25dfdbfb, {0xe}, [@typed={0x8, 0x5d, 0x0, 0x0, @pid=r0}, @typed={0x8, 0x21, 0x0, 0x0, @pid=r0}, @typed={0x8, 0x3b, 0x0, 0x0, @fd}, @generic="323bb74d008868514cb450bd7bc6fd13b45deca9db101aaeb0e87d31924e0ffb57df41b942f970b408189b265e1838b8af1a81dc000ee18f4fb39b60d61885ea40f86599be625ff9451c4281ac5be878bf638dfd5ac8e357a747d9e834e8aa85f5caf02ecd2bba7947a52bf1bf74ae4c6fedfa2b4a76b163526ba2f2cc893942367768aacbcfec39aae5e676c8da7017a38d7225c2ee", @nested={0x37, 0x30, 0x0, 0x1, [@generic="51489a3abb85099ed6a2bcaccdfb9b4276fc8e6243c27ccc48", @generic="7784c25164b9354f01ae7d2bb84f7052636905f43b10a1fc3cef"]}, @generic="7668f3338ea6b9f0a84ddfb85a23267d28aa149ffa6e5eaee577806121eb245212071f2bcea85915046049b8d73f84a3d31af522cee702261a0909dc108f60bf6e349eafa0275ea761fe132046218f8ae2d8ccfdf14136a0051831229d51cf43b00870f18945f95f98d3edaf78abde1ecd78d8ec789f2f403e19f7f9d36ae57613a9854c30dda24a1c3e2bebad72d492c6512062c608f0669786d24c00650bcfac2f1f4fe130ba186e4541db69abf58afddd1d35bfe6e48e46387b3ddbcdd1938cd8fc7d4de31ea472f531"]}, 0x1c8}, 0x1, 0x0, 0x0, 0x844}, 0x4000081) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:06 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000180)=[{0x25}, {0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 04:41:06 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) clone(0x32308200, &(0x7f0000000000)="ed50cb65b160755f9497825c384796d0d5d176f5c1d3b87b855a137f24b1a6946ee8886dc695168841ca805815745f503c3506f70ef0b73da6ff09b5c9133697de64c2a22842f455da7d2e843f1409d24e857c5afe2dbc1c6d0ec580a92ebd906821beff592e3f0b62f0d94c16f9eb312adeda12f6", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)="41ae3ba5482159e41a15e34d8760b2dfd64f4997b0559e9de7f6b565eac5b11c09dcf1ba4b79c274f7e77f8edeff5e3a61182cea8135fc425657612c3f56a456d76bab64d5391de37616d569c962480939414cdba4a978858e0b469869aed153f4c5864a03317a3d73d4a29dcc8231bebf44b1713217") wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:06 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="080004000018f7f0000000"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 138.853962][T11583] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 138.900987][T11645] loop5: detected capacity change from 0 to 6 [ 138.917741][T11645] FAT-fs (loop5): Directory bread(block 6) failed [ 138.959813][T11665] loop4: detected capacity change from 0 to 1024 [ 138.968616][T11665] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 138.981839][T11665] EXT4-fs (loop4): orphan cleanup on readonly fs [ 138.988229][T11665] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 139.003098][T11665] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 139.054217][T11676] FAT-fs (loop2): bogus number of reserved sectors [ 139.060729][T11676] FAT-fs (loop2): Can't find a valid FAT filesystem 04:41:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xb, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:07 executing program 3: ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f00000001c0)={0x8, 0x5, 0x6, 0x6, 0x3, [{0x2, 0xffff, 0xffff, '\x00', 0x200}, {0x1, 0x4, 0x4, '\x00', 0x52bcb785dc8a3b23}, {0x6, 0x7fff, 0x400, '\x00', 0x8}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x16}]}, 0x10) sendmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)="061c0f91", 0x4}], 0x1}}], 0x1, 0x0) 04:41:07 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\f\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:07 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x42, 0x2}, @period={0x59, 0x1, 0x4, 0x0, 0x4, {0x3, 0x4, 0x6, 0x9}, 0x2, &(0x7f0000000000)=[0x3, 0xfffd]}}) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000200)={0x1, 0x0, 0x0}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000480)=""/241) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)=""/106, 0x6a}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYRES32], 0x118}, 0x40000043) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x8, 0x3) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)="e2", 0x11a0) 04:41:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:07 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x5) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) ptrace$cont(0x7, r1, 0x80, 0x6b0) 04:41:07 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x800) r0 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r0, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, '\x00', 0x3}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_CLPDOI={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004005}, 0x12) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="3800004803000000f60de0c97e3b00", @ANYRES16=r1, @ANYBLOB="010000000000000000000400000014000600fc00000000000000000000000000000006000500000040000800020005000000d6ff889a2a659e2df8cc0b160a5bda07d5d7b7f2a0184fee9fdfa8b74ae28481d2"], 0x38}}, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="280000b8814987cdb5dab281fdda19858eb35777ed38b8fea2184f00000000", @ANYRES16=r1, @ANYBLOB="01002dbd7000fcdbdf250400000014000500fe8000430000000000000000000000aaa8eb6410d18b71b831034b6b725aadc56709311a4a75e5481a8819b47dd22b812258b024d3715a648d25925ade21a5d00309ef45f96272ec7c705d41a8680b92df6f7ed6a5aa5c2ec147b10abd621c05e879ea94a305fbf1502045864b2c5b5f4bf2f52194ea3f99d673153ba913023e5623628a7cbf29491f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) set_mempolicy(0x2, &(0x7f0000000140)=0x2, 0x3) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x400040, 0x4) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x301000, 0x0) ioctl$TIOCSIG(r3, 0x40045436, 0x4) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r4) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r5) sendmsg$NLBL_MGMT_C_ADDDEF(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r7, 0xd, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x38}}, 0x4000081) sendmsg$NLBL_MGMT_C_ADD(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="1c0227bd7000fbdbdf250100000014000600fc010000000000ff0700000000000001"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) fallocate(0xffffffffffffffff, 0x57, 0x0, 0x7fffffff) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f00000000c0)) [ 139.768902][T11702] loop5: detected capacity change from 0 to 6 [ 139.771861][T11703] loop4: detected capacity change from 0 to 1024 [ 139.793011][T11702] FAT-fs (loop5): Directory bread(block 6) failed 04:41:07 executing program 3: unshare(0x40000200) socket$inet(0x2, 0x800, 0x100) set_mempolicy(0x1, &(0x7f0000000140)=0x3, 0x425) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) 04:41:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xc, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 139.833238][T11703] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 04:41:07 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="08000000000003508ffd014b5a9f63ab14a3c508b7a88f65ab4990e5ac74265ee3de0422a1"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="000000000000fc370800140000000c000600080001000000000018000200080001df000000000800010000000000040004006c00140054000600080004000000000008000100000000000800020000000000080001000000a5000800030000000000080002002600000008000200000000000800040018000000080003000020000008000200f571ff070000000000006f61646361f3762d6c696f6b0000580005005400388a8e44a20ce41d08000800efff200000000800020000000000088004000000000008000300000000000800030000000000080101a4000400becf000400010000000800020800000000080002000000ef1e1400060008000100000500000800010000000000ff7f0100080003000000000010000100756470d9027d7a3000000000380004001400010500000000000000ff000000040d78d2002000026e1a00000000000000209ff2c6d22851b4b84ea2e743c1ef660000000008aeede4b4548c98e2184300009e00141f042d297700010002000000ac14140000000000000000e61301020002000000ac14140000000009c4f4f6776297ae00080002000000008008000302000100002c0004000c00010002000000ac14140000000000000000001400020002000000ac144d3d8dac06e58c9c16004400010038080400200000000a000000030100000000000000000000000000000000004e230000001400020002000001ac1414bb00000080555104220800030001"], 0x2}}, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff708800008003280008020100ff050000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) [ 139.875914][T11703] EXT4-fs (loop4): orphan cleanup on readonly fs [ 139.882283][T11703] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 139.898325][T11703] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 04:41:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:07 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="081d00000000000007002e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 139.921521][T11732] loop5: detected capacity change from 0 to 6 [ 139.930350][T11732] FAT-fs (loop5): Directory bread(block 6) failed [ 139.954855][T11756] loop4: detected capacity change from 0 to 1024 04:41:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xd, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 139.976882][T11752] netlink: 4548 bytes leftover after parsing attributes in process `syz-executor.0'. [ 140.006611][T11756] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 140.012796][T11769] loop3: detected capacity change from 0 to 1024 04:41:07 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000140), 0xe3a9d00319febe39, &(0x7f0000000480)) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)="8423d9174e0000d4ba47501f9955e1c1bb7935017d826284999d687ae3ee1c5bda0cddde34c5897b1f3b0dfdcd6ac1b5b5da124fbcda50d1358fdd0a6243f1162047faea0e29db6c9ef3282f696a228356dcc3f748b6aa1bd72ccf0b03546b4071086d255c2b076342c1798c619f5934beab789ed62b2fecbf2d507a89fdf48a371f4002ab8bfc90c92e20e3d10a114af09a0455") r2 = gettid() r3 = fork() ptrace$cont(0x20, r3, 0x7, 0x7ff) rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) gettid() [ 140.031178][T11777] netlink: 4548 bytes leftover after parsing attributes in process `syz-executor.0'. [ 140.041155][T11756] EXT4-fs (loop4): orphan cleanup on readonly fs [ 140.047499][T11756] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 140.061693][T11779] loop5: detected capacity change from 0 to 6 04:41:07 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r0]) r1 = gettid() tkill(r1, 0x3a) 04:41:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xe, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 140.087918][T11756] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 140.106920][T11769] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 140.116796][T11779] FAT-fs (loop5): Directory bread(block 6) failed 04:41:07 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="1800000000bdc67351002e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(r0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000000)={0x1, 0x1, 0x3, {0x0, 0x10001}, 0x6, 0x7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 140.153728][T11769] EXT4-fs (loop3): orphan cleanup on readonly fs [ 140.160157][T11769] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 140.171397][T11769] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 04:41:07 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000300)) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r0, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x800) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) 04:41:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4246, &(0x7f00000000c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000480)={0x53, 0xfffffffffffffffd, 0xcc, 0x4, @buffer={0x0, 0x87, &(0x7f00000001c0)=""/135}, &(0x7f0000000280)="eef22dcacfb4d823915c4734bc8bc387068f0abb7a7d1c71f12e1bc7323e980e921f19b9fc4d092d89c790fc735d58f269b1eab8a4b516b5a3bee3bc4c9c771ef4d35a58d8dff6e383ba552e42a0686b1004118afab64e4cf9b18c4019227104e9fdb2e24a470623ec076a2422e376c45d19a3e4d74d1f122d1b41c12ca17439a1272dbd49ebe6ff32b256d7a0ea096263cdc2d75fb1471eead5cb724340470daaf8834161a725ba80d95db4eeb98684853abe91d39ebde05eb5dec69ce77583dcbdbdaa78bac265b9059ec6", &(0x7f0000000380)=""/182, 0x8, 0x30, 0x3, &(0x7f0000000440)}) [ 140.197583][T11790] 9pnet_virtio: no channels available for device 127.0.0.1 [ 140.221279][T11802] loop5: detected capacity change from 0 to 6 [ 140.230147][T11803] loop4: detected capacity change from 0 to 1024 [ 140.245312][T11790] 9pnet_virtio: no channels available for device 127.0.0.1 04:41:07 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000000)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x25, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0xf18, 0x80000001, 0x3, 0xfffffff5}, 0x14) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000040)={0x1, 0x7, 0x2}) write$binfmt_misc(r1, &(0x7f0000000d40)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4000000000003, 0x0) [ 140.275441][T11802] FAT-fs (loop5): Directory bread(block 6) failed [ 140.291521][T11803] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 140.307551][T11820] TCP: TCP_TX_DELAY enabled 04:41:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xf, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:07 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x42241, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0xb16) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) fcntl$lock(r1, 0x5, &(0x7f0000000140)={0x0, 0x3, 0x3f, 0x1}) r2 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x5) inotify_rm_watch(r0, r2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) [ 140.351293][T11803] EXT4-fs (loop4): orphan cleanup on readonly fs [ 140.357681][T11803] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 140.380417][T11803] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 04:41:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 140.441941][T11844] loop5: detected capacity change from 0 to 6 [ 140.475115][T11844] FAT-fs (loop5): Directory bread(block 6) failed 04:41:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) setrlimit(0x4, &(0x7f0000000080)={0xfffffffffffffff8, 0x100000000}) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000500)=0x9) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x6, 0x52, 0x0, 0x5001e43d, 0x4, 0x7, 0x7fffffff, 0x0, 0x85}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tkill(r0, 0x28) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000000de10ac900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000ff01000000000000000b0000000004000008000000d2c200", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0}, {&(0x7f00000000c0)="4bcb5a24ef60a2d0069e0c7926eb1ab24c244d045ad7ebc9d038e630f8e75f43d7c398de7dc08d5841b887854e2d", 0x2e, 0x8000}, {&(0x7f0000000140)="749122feee8e9963b30f0c399b33b393d4503bd59f6397fbd064186ee52f4794c6b261cc133ed3e2fb9b76297fdf9857f48ff0e5fb18b911239119bbcdf55486030391cbdffe0ca8ebb57706d815a874f3b22fbdbd75871ff54752e321077f3aaf08fbfc771787a6ebe9baf35c3fa2262e5e5157039c14dceda0020694", 0x7d, 0x1}], 0x11804, &(0x7f00000000c0)=ANY=[]) 04:41:08 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x10, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:08 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(0x0, 0x0, 0x7) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x349841, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x1000, 0x101) getsockopt$inet_int(r1, 0x0, 0xb, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3200c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x5b) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {}, {0x2, 0x1, @local}, {0x2, 0x0, @empty}, 0x4a, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x0, 0x3f}) sendmmsg(0xffffffffffffffff, &(0x7f0000001400)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000014c0)=ANY=[], 0x4d8}}, {{&(0x7f0000000300)=@rc={0x1f, @none, 0x9}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000440)}, {0x0}, {&(0x7f0000000180)="f3f6e5a24c3acc22fc5f9c5bd8ebdfc0de", 0x11}], 0x3, &(0x7f0000000200)=ANY=[], 0x420}}], 0x2, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x7ff) keyctl$set_timeout(0xf, 0x0, 0xfffffffffff) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="4d28a31bd9fbe2f53586d8b519da05afeed88b003ffdc5345f563eb0036f404b70ba380c654df500008dbb78f2a222e909431e64adc859b6ec8f2343a25275b2cc3bf90c7d916f532f609102b27f2b2fcc7cc84db7ea93cf27e5d5365de90565f145bc017b8c086fd1b7c0d5eb74c8e21cc3d601430c2af6b64f6e06c82960ebd6ad1e2732cba649e1852e755a2906005da49988"], 0xbf) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000100)={0x3f7, 0x7, 0xfffffff7, 0x3, 0x7b8, 0x6}) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) [ 140.539317][T11858] loop4: detected capacity change from 0 to 1024 [ 140.569784][T11858] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 140.586978][T11858] EXT4-fs (loop4): orphan cleanup on readonly fs [ 140.593355][T11858] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 140.618345][T11869] loop5: detected capacity change from 0 to 6 [ 140.666118][T11869] FAT-fs (loop5): Directory bread(block 6) failed [ 140.677234][T11858] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 04:41:08 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x11, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:08 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x14d842, 0x0) writev(r1, &(0x7f00000004c0)=[{&(0x7f0000000540)="ac", 0x1}], 0x1) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ftruncate(r0, 0x28f) syncfs(r1) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fstat(r4, &(0x7f00000000c0)) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0xc, r1}) [ 140.797512][T11893] loop5: detected capacity change from 0 to 6 [ 140.826769][T11893] FAT-fs (loop5): Directory bread(block 6) failed [ 140.854179][T11905] loop4: detected capacity change from 0 to 1024 [ 140.887549][T11905] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 140.917574][T11905] EXT4-fs (loop4): orphan cleanup on readonly fs [ 140.923992][T11905] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 140.971708][T11905] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 04:41:08 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="08000000000000006aa92e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000580)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}, {&(0x7f0000000500)=""/71}, {&(0x7f0000000480)=""/93}], 0x1000000000000089, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() clone(0x40000, &(0x7f00000003c0)="3d0c11d029dd7041df963a6af7b153cdb7797ac629dad2a8ac967f13fce50233a23ad2e56d1c05f52a4e7e6b723b8fd81a8616c3d4060ead55eae13739001ec214d8e117ab60390b621200814654e5d8339157e05fa32ef450f476adc9ff4b513aea91b6d050897a9cb8782f98ea84bf8eea57feb25bb81f906d37e8b786e8e2490a5e241ae056c15d57c0db4a775006a5d88d01d80ca882a89d552a30de6b31b021f9e6128c453191c31c60c18d8d4226ea69", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000140)="0e956d77") rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:08 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x12, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:08 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x11, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:08 executing program 0: sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x30, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x72}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x85}, @NL80211_ATTR_BANDS={0x8, 0xef, 0xf}]}, 0x30}, 0x1, 0x0, 0x0, 0x8001}, 0x20004001) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)={0x44, 0x2, 0x2, 0x801, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x2, @private0}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @empty}}}}]}]}, 0x44}}, 0x0) [ 141.184375][T11937] loop4: detected capacity change from 0 to 1024 [ 141.191259][T11938] loop3: detected capacity change from 0 to 6 [ 141.194661][T11942] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 141.200200][T11938] FAT-fs (loop3): Directory bread(block 6) failed [ 141.208489][T11939] loop5: detected capacity change from 0 to 6 [ 141.212391][T11937] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 141.248657][T11939] FAT-fs (loop5): Directory bread(block 6) failed [ 141.254526][T11937] EXT4-fs (loop4): orphan cleanup on readonly fs [ 141.261424][T11937] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 141.282557][T11954] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 04:41:08 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="080ba8d055427922729a00"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xe, &(0x7f00000002c0)) 04:41:08 executing program 3: r0 = syz_open_procfs(0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') r2 = getpid() sched_setaffinity(r2, 0x8, &(0x7f0000000500)=0x9) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = fork() r4 = syz_open_procfs(r3, &(0x7f0000000100)='net/if_inet6\x00') pread64(r4, &(0x7f0000000140)=""/62, 0x3e, 0x76) clone3(&(0x7f00000001c0)={0xc0003000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000080), 0x0, {0x800028}, 0x0, 0x0, 0x0, 0x0, 0x0, {r4}}, 0x58) r6 = getpid() sched_setaffinity(r6, 0x8, &(0x7f0000000500)=0x9) tkill(r6, 0x2e) rt_sigqueueinfo(r2, 0x14, &(0x7f0000000240)={0x1f, 0x7, 0x401}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f00000000c0)) readahead(r5, 0x100000001, 0x5) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)=0x0) waitid(0x2, r7, &(0x7f00000002c0), 0x40000000, &(0x7f0000000340)) [ 141.288230][T11937] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 04:41:08 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x18, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:08 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x121002) setresuid(0xee00, 0xee01, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x690a}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r1, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001480)={0x53, 0xffffffffffffffff, 0xb8, 0xfd, @scatter={0x5, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000040)=""/211, 0xd3}, {&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000001c0)=""/16, 0x10}, {&(0x7f0000001240)=""/85, 0x55}]}, &(0x7f0000001340)="84059598606c34a6d128d58b2df813985188e80daf3e6215af120a430df0f0b2186e976b2521adb8677b5b8e5e5610c564b3768e16f3fe7aae1dfed254684d105d5a9034a9eeeef857cacc8f7a12c846e310c3df5aaaf3f42037efa980a67db74ea5e55b2969c08fc6d813d38e0f8038dcc529e74ff049b3771a130350346ea020e7d2d9393c13ecfc85716402104b8683912f16935a3dc6bb535a6e91416e46c5795a8193f9062e81361529dc4db5d2c1417ff358a4ac1d", &(0x7f0000001400)=""/50, 0x8000, 0x20, 0x0, &(0x7f0000001440)}) 04:41:08 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000140)=0x6e) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000180)={0x6, 'vcan0\x00', {0x232d}, 0x1000}) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) 04:41:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 141.393604][T11975] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 141.407950][T11974] loop5: detected capacity change from 0 to 6 04:41:09 executing program 1: sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81080101}, 0xc, &(0x7f0000000040)={&(0x7f00000003c0)={0xac, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x60, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x5c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}]}]}, @NL802154_ATTR_SEC_KEY={0x38, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x8}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x3f}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "fdcd3d6cd931e2923a9af0b24bfba2ca30ad471cc6e6718a20c238ce284f88af"}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x44084}, 0x0) r0 = gettid() tkill(r0, 0x7) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES16=r0, @ANYRES16=0x0, @ANYRES16=r0], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(r1, 0x0, 0x8, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) 04:41:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000300)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0xfffffffffffffe77) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) [ 141.439902][T11974] FAT-fs (loop5): Directory bread(block 6) failed [ 141.469741][T11989] loop4: detected capacity change from 0 to 1024 04:41:09 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1b, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 141.514586][T11989] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 141.549126][T12005] loop5: detected capacity change from 0 to 6 04:41:09 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000500)=0x9) wait4(r1, &(0x7f0000000040), 0x20000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x7) wait4(r2, &(0x7f0000000000), 0x1, &(0x7f00000003c0)) r3 = gettid() rt_sigqueueinfo(r3, 0xa, &(0x7f00000002c0)) [ 141.562134][T11989] EXT4-fs (loop4): orphan cleanup on readonly fs [ 141.568474][T11989] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 141.585350][T12005] FAT-fs (loop5): Directory bread(block 6) failed [ 141.611850][T11989] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 04:41:09 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x22, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 141.728149][T12028] loop5: detected capacity change from 0 to 6 [ 141.737737][T12028] FAT-fs (loop5): Directory bread(block 6) failed 04:41:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:09 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x25, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 141.826641][T12046] loop4: detected capacity change from 0 to 1024 [ 141.829329][T12047] loop5: detected capacity change from 0 to 6 [ 141.849274][T12047] FAT-fs (loop5): Directory bread(block 6) failed [ 141.871193][T12046] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 04:41:09 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x48, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 141.898126][T12046] EXT4-fs (loop4): orphan cleanup on readonly fs [ 141.904627][T12046] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz-executor.4: bad orphan inode 33554432 [ 141.934800][T12046] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 04:41:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 141.963274][T12058] loop5: detected capacity change from 0 to 6 [ 141.993599][T12058] FAT-fs (loop5): Directory bread(block 6) failed 04:41:09 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x4c, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 142.049962][T12072] loop4: detected capacity change from 0 to 1024 [ 142.070626][T12072] EXT4-fs (loop4): unsupported descriptor size 0 04:41:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 142.098988][T12081] loop5: detected capacity change from 0 to 6 [ 142.113318][T12081] FAT-fs (loop5): Directory bread(block 6) failed 04:41:09 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x60, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 142.145790][T12089] loop4: detected capacity change from 0 to 1024 [ 142.170926][T12089] EXT4-fs (loop4): unsupported descriptor size 0 [ 142.191686][T12094] loop5: detected capacity change from 0 to 6 [ 142.208132][T12094] FAT-fs (loop5): Directory bread(block 6) failed 04:41:09 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x68, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 142.303361][T12109] loop5: detected capacity change from 0 to 6 [ 142.318783][T12109] FAT-fs (loop5): Directory bread(block 6) failed 04:41:10 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)={'U-', 0xa95d}, 0x16, 0x3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={[{@huge_never}, {@huge_always}, {@mode={'mode', 0x3d, 0x7ff}}, {@huge_never}, {@nr_blocks={'nr_blocks', 0x3d, [0x38, 0x6b, 0x2d, 0x70, 0x70]}}, {@gid={'gid', 0x3d, 0xee01}}], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}], 0xa}) 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:10 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x6c, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:10 executing program 0: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffe, 0x37, 0x1, @buffer={0x0, 0x57, &(0x7f0000000240)=""/87}, &(0x7f0000000000)="2a57bda2b59c1d7f5b855909507f3cef89ba2f3fd9717d876beda0efef3f7c7912c3d03400426b7ad07418dc6c0547db3f8828352dd45b", &(0x7f00000002c0)=""/149, 0x6, 0x10, 0x1, &(0x7f0000000180)}) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1c00000007ffff0e00ffefe04761ab55883a185e38e9b1"], 0x52) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u}]}}) [ 142.483302][T12123] tmpfs: Unsupported parameter 'huge' [ 142.508823][T12128] loop4: detected capacity change from 0 to 1024 [ 142.518903][T12131] loop5: detected capacity change from 0 to 6 [ 142.536864][T12128] EXT4-fs (loop4): unsupported descriptor size 0 [ 142.550958][T12131] FAT-fs (loop5): Directory bread(block 6) failed 04:41:10 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x74, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x80, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, r1, 0x400, 0x70bd25, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x8, 0x49}}}}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000004}, 0x20) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xe4, 0x0, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xd02}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x48e}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8a}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x76}]}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xffff}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x810}, 0x1c014) unshare(0x48040480) unshare(0x24000a00) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300110468fe0700000000000000ff3f020000003b0a00010000000004002b00050003002ea4ee1ee438d2fd000000000000007200", 0x39}], 0x1) 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 142.657054][T12149] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.0'. [ 142.667170][T12154] loop5: detected capacity change from 0 to 6 [ 142.681507][T12163] loop4: detected capacity change from 0 to 1024 [ 142.689841][T12154] FAT-fs (loop5): Directory bread(block 6) failed [ 142.708003][T12163] EXT4-fs (loop4): unsupported descriptor size 0 04:41:10 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x78, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x0, 0x0, "e9deec75c6f3744b"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r1, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000000)) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000004c0)) [ 142.829925][T12186] loop5: detected capacity change from 0 to 6 [ 142.844216][T12190] loop4: detected capacity change from 0 to 1024 [ 142.861329][T12186] FAT-fs (loop5): Directory bread(block 6) failed [ 142.891405][T12190] EXT4-fs (loop4): unsupported descriptor size 0 04:41:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001280)=ANY=[], 0x6e2226) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010800010000", @ANYRES32, @ANYBLOB="1f"], 0x3c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000300)={0x24, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x9c, r1, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x10000, 0x28}}}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x880}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x16, 0xcd, [0x101, 0x6, 0x4, 0x9, 0x0, 0x0, 0x7, 0x3, 0x8]}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x8, 0xcd, [0xba5, 0x59]}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x16}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x19}]]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0xc845) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x7, 0x2c}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:41:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000600)={0x3, &(0x7f0000000040)=[{0xffff, 0x6}, {0x1000, 0x8}, {0x8105, 0xfff9}]}) 04:41:10 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x7a, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 142.999337][T12215] loop5: detected capacity change from 0 to 6 [ 143.027146][T12221] loop4: detected capacity change from 0 to 1024 [ 143.035706][T12215] FAT-fs (loop5): Directory bread(block 6) failed 04:41:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@private0, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000023005f5600012bbd00000000df2500"/32], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x804) socketpair(0xf, 0x6, 0xb4d, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, 0x1, 0x3, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000009c0)=@newae={0x140, 0x1e, 0x4, 0x70bd29, 0x25dfdbff, {{@in=@empty, 0x4d5, 0x2, 0x2b}, @in6=@private1, 0x7, 0x3506}, [@algo_aead={0xb1, 0x12, {{'morus640-sse2\x00'}, 0x328, 0xc0, "6909c9d02b3659b13069991f8ef9af55d9fe2586957611eeb3b86fb9709192ec9d6fa0eda1785e573b993c611041bed6748621ca2cfcbf0d655dae633052b671cca382611a736dbd32744b5d079ae4560bb486271207f70f6e2331461cc8e67ea2ebc521d0"}}, @extra_flags={0x8, 0x18, 0x1}, @coaddr={0x14, 0xe, @in6=@loopback}, @algo_aead={0x0, 0x12, {{'aegis128-aesni\x00'}, 0x0, 0x40, "7b149b9621350b"}}, @proto={0x5, 0x19, 0x3c}]}, 0xffffffffffffff94}, 0x1, 0x0, 0x0, 0x80}, 0x40) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r3, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f00000000c0)={'veth1_to_bridge\x00', {0x2, 0x0, @initdev}}) write$binfmt_misc(r0, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r2) sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000b40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000e010}, 0xc, &(0x7f00000001c0)={&(0x7f00000008c0)={0x64, r4, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xbdd5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x101}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x41125431}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x255}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4e2f}]}, 0x64}, 0x1, 0x0, 0x0, 0x4004010}, 0x40010) splice(r0, &(0x7f0000000540)=0x5, r0, &(0x7f0000000580)=0x501e, 0x0, 0x19) sendmsg$nl_xfrm(r0, &(0x7f0000000980)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000940)={&(0x7f0000000600)=@flushpolicy={0x14c, 0x1d, 0x4, 0x70bd27, 0x25dfdbfd, "", [@replay_val={0x10, 0xa, {0x70bd28, 0x70bd2c, 0x4}}, @replay_val={0xffffffffffffff40, 0xa, {0x70bd25, 0x70bd29, 0x7}}, @srcaddr={0x14, 0xd, @in6=@ipv4={'\x00', '\xff\xff', @multicast2}}, @algo_auth_trunc={0x75, 0x14, {{'sha1\x00'}, 0x148, 0x100, "476bf3231e284d65f23e0708f7e716e4fe65c837e18079f43a0ff6757092c0ef7dcd05c25514b2ac4f"}}, @migrate={0x4}, @replay_thresh={0x8, 0xb, 0x3}, @algo_auth_trunc={0x81, 0x14, {{'sha256-asm\x00'}, 0x1a8, 0x0, "cfa85388d892145d765e1c0d6da3486934336f84f299892a6e4424c002b9b594ed17c38ffdfffffffffffffff5f391777c18e10edf"}}]}, 0x14c}}, 0x200040d4) [ 143.067996][T12221] EXT4-fs (loop4): unsupported descriptor size 0 04:41:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002a40)=[{{&(0x7f0000000400)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f00000024c0)=[@flowinfo={{0x14, 0x29, 0x36}}], 0x18}}], 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 04:41:10 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xca, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:10 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000001000008000000d2420000120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33323937363736343400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000def361b116dd4bb681391964ccf077da010040000c00000000000000d0f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000003700000000000000", 0x40, 0x540}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d0f4655fd0f4655fd0f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d0f4655fd2f4655fd2f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010f00)="20000000100de17a100de17a00000000d0f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000011000)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000300000000200000004000000320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d0f4655f00"/160, 0xa0, 0x1600}, {&(0x7f0000011100)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004000000420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d0f4655f00"/160, 0xa0, 0x1700}, {&(0x7f0000011200)="c041000000300000d0f4655fd0f4655fd0f4655f00000000000002002000000000000800000000000af301000400000000000000000000000c00000020000000", 0x40, 0x1e00}, {&(0x7f0000011300)="2000000000e100000000000000000000d0f46500"/32, 0x20, 0x1e80}, {&(0x7f0000011400)="ed41000000040000d2f4655fd2f4655fd2f4655f00000000000002002000000000000800030000000af3010004000000000000000000000001000000500000000000000000000000000000000000000000000000000000000000000000000000000000003f81d1a200000000000000000000000000000000000000000000000020000000100de17a100de17a100de17ad2f4655f100de17a0000000000000000", 0xa0, 0x1f00}, {&(0x7f0000011500)="ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000009caef32e00000000000000000000000000000000000000000000000020000000100de17a100de17a100de17ad2f4655f100de17a0000000000000000", 0xa0, 0x2000}, {&(0x7f0000011600)="ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3332393736373634342f66696c65302f66696c6530000000000000000000000000000000000000000000000ae0cdf100000000000000000000000000000000000000000000000020000000100de17a100de17a100de17ad2f4655f100de17a0000000000000000", 0xa0, 0x2100}, {&(0x7f0000011700)="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", 0x1a0, 0x2200}, {&(0x7f0000011900)="ed81000064000000d2f4655fd2f4655fd2f4655f00000000000001002000000000000800010000000af3010004000000000000000000000001000000900000000000000000000000000000000000000000000000000000000000000000000000000000008880d39500000000000000000000000000000000000000000000000020000000100de17a100de17a100de17ad2f4655f100de17a0000000000000000", 0xa0, 0x2400}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011b00)="0b0000000c0001022e00000002000000f40302022e2e00"/32, 0x20, 0x8000}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012400)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012500)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012600)="00000000000400"/32, 0x20, 0xac00}, {&(0x7f0000012700)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xc000}, {&(0x7f0000012800)="0200"/32, 0x20, 0xc400}, {&(0x7f0000012900)="0300"/32, 0x20, 0xc800}, {&(0x7f0000012a00)="0400000000000000000800000000000000", 0x11, 0xcc00}, {&(0x7f0000012b00)="0500"/32, 0x20, 0xd000}, {&(0x7f0000012c00)="0000000000000000010000000000000000000000e925f2be0000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0xd400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x10000}, {&(0x7f0000012e00)="02000000000000000000000000000800"/32, 0x20, 0x10400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x10800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x10c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x11000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000e925f2be0000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0x11400}, {&(0x7f0000013300)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d803050766696c653100"/64, 0x40, 0x14000}, {&(0x7f0000013400)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x18000}, {&(0x7f0000013900)='syzkallers\x00'/32, 0x20, 0x1c000}, {&(0x7f0000000a00)="73797a6b616c6c657273797a6b616c6c657273797a6b6173797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273796c6c657273797a6b216ca4a9e04a00dbf1a92f686f337eef6572730000000000000000002000"/129, 0x81, 0x24000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='G']) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000680)="986526401667150a366b1c5ac6d9d994328b8f1e349336877d14e4250bd3fe6adcd05ecf2c928c3d44bb280fbf006f3706e05acc342b0e20be992331f11ca84d1b37f8fb7bd1f64e2a68ecb2b474f52c00899d93b5195068c317f513a2927a26e014b71a84d8c43efc78ea63edb3bd53ab06fead4541401f86ecb43eb4cc6e8e66932431d8a84b8b979885d67ef899c1a1799b37c8bca8ae46e6d5e65fb58ba8a7e8dc5f0db9b362cd7a6bdbb30d1f1c69b544c99858221db74a2a22d328ec4b4f9bf86c04a116a098e90ed4245a7ef7f177a99e22b927113a84d39d82318b124511c7803db8cb7b5ab9fbd66a738eb6ce5fae233d6543f1", 0xf8, 0x5}], 0x18a1000, &(0x7f0000000140)={[{@dots}, {@nodots}, {@nodots}, {@dots}], [{@subj_role={'subj_role', 0x3d, '-'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xb0&'}}, {@fsname={'fsname', 0x3d, '\x10'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '%@{'}}]}) unlinkat(r1, &(0x7f0000000780)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000800)={0x0, ""/256, 0x0, 0x0}) chdir(&(0x7f00000007c0)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000059f40)={r4, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005af40)={0x8001, [{r2, r4}, {0x0, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {r2}, {r3, r4}, {r2, r4}, {r3, r4}, {r3}, {r2, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3}, {r3, r4}, {r3}, {r2, r4}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {r2}, {r2, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r3, r4}, {r3}, {r2, r4}, {r3, r4}, {0x0, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r3}, {r3, r4}, {r2, r4}, {0x0, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {r2}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r2}, {r2, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {0x0, r4}, {r2}, {r3, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r2}, {r2, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r3}, {0x0, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {0x0, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {0x0, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r3}, {r2, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r3}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r3}, {r3, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r3}, {r2, r4}, {r2, r4}, {r3, r4}, {r3}, {r3, r4}, {}, {r2}, {r3, r4}, {r3}, {r2, r4}, {r2, r4}, {r3}, {0x0, r4}, {r2}, {}, {r2, r4}, {r3}, {r2, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {0x0, r4}, {r2}, {r3, r4}, {r2}, {r3, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3}, {r3, r4}, {r2, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {r3}, {0x0, r4}, {r2, r4}, {r2}, {r2, r4}, {r3, r4}, {r3, r4}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r3}, {r2, r4}, {r3, r4}, {r2}, {r3}, {r2, r4}, {r3, r4}], 0x81, "6acba130be14c3"}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x5, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f000004db80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x0, "8bebeb894f74c3"}) r10 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa64f, 0x0, @perf_bp, 0x0, 0x200, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r10, 0x84009422, &(0x7f0000001940)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r14, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r13, @ANYRES32=r12, @ANYRESOCT, @ANYRES32=r11, @ANYRES32, @ANYRES64, @ANYRESHEX=r10], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005bf40)={0x0, [{0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {r2}, {0x0, r4}, {r3}, {r3, r4}, {0x0, r4}, {r2}, {r3}, {r2}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {}, {r3}, {}, {r2, r4}, {r2, r4}, {r3, r4}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {0x0, r4}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r2}, {}, {}, {r2}, {}, {0x0, r4}, {}, {}, {}, {}, {r2}, {}, {0x0, r4}, {0x0, r4}, {}, {}, {r2, r4}, {r2, r4}, {r2}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {r3}, {}, {r3, r4}, {}, {r2}, {}, {r3, r4}, {}, {}, {}, {0x0, r4}, {}, {r3}, {r2, r4}, {0x0, r4}, {}, {r2, r4}, {0x0, r4}, {r2}, {r2}, {r3}, {r2, r4}, {r3}, {r2}, {r2}, {}, {r3}, {r3, r4}, {}, {r3}, {}, {r3, r4}, {}, {}, {}, {r2, r4}, {0x0, r4}, {r3, r4}, {}, {0x0, r4}, {}, {r2, r4}, {0x0, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {0x0, r4}, {r3}, {r2}, {0x0, r4}, {r2, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {0x0, r4}, {}, {r2}, {r3}, {r2}, {r2, r4}, {}, {r2, r4}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {r2, r4}, {}, {r3, r4}, {}, {r3}, {r2, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {0x0, r4}, {}, {r2}, {}, {0x0, r4}, {r3}, {}, {r3}, {}, {r3}, {0x0, r4}, {r2}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {r2}, {}, {}, {0x0, r4}, {r3, r4}, {0x0, r4}, {}, {}, {}, {r2}, {0x0, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {r2}, {0x0, r4}, {r3}, {r2}, {}, {}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {}, {r2}, {r3}, {}, {0x0, r4}, {}, {r3}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {0x0, r4}, {r2, r4}, {}, {r2}, {r2}, {r2, r4}, {0x0, r4}, {}, {r5, r4}, {r6, r4}, {r8, r11}], 0x40, "fe47148b4d216c"}) [ 143.200195][T12246] loop5: detected capacity change from 0 to 6 [ 143.209828][T12247] loop4: detected capacity change from 0 to 1024 [ 143.227475][T12246] FAT-fs (loop5): Directory bread(block 6) failed 04:41:10 executing program 3: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x4) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=@sha1={0x1, "2e9f25835b7d0ecc3b928ef18786d64956b7fe55"}, 0x15, 0x7) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x35}, {0xac}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x101600) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000880)={0x20, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000013c0)={&(0x7f0000000240)={0x1150, r2, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_SOPASS={0x1004, 0x3, "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"}, @ETHTOOL_A_WOL_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_WOL_MODES={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7, 0x5, "6002a6"}]}, @ETHTOOL_A_WOL_SOPASS={0xce, 0x3, "5456fc8bcdf1f1fb537239cddcf0d05afaec38fbd2eb0dade1a0717bb4d170333f2a977d81be987e3891204fc70a08c02d196e0b7cb146286d21cfdf349a6a97368423513643e2965658be5e507961a93b76004aef85abef8124658b665ac623fe5fb884b563cf666cfd838972a0d2f8cfd5f9ef16e384939756ebba37632f31b4f412130d4e052908ad29cdaad3360437f2c138a2d5ed02a57b5687049e9b20346e93388c057898bcd61f91fae224e045e766ecc76eb7b7ffc50cfde52930bd46bdf8ed1e2575a0eef6"}]}, 0x1150}, 0x1, 0x0, 0x0, 0x6040001}, 0xd0) open(&(0x7f0000000080)='./bus\x00', 0x2040, 0x0) [ 143.249560][T12260] loop2: detected capacity change from 0 to 1024 [ 143.260119][T12247] EXT4-fs (loop4): unsupported descriptor size 0 [ 143.275676][T12258] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 143.287904][T12260] EXT4-fs (loop2): Unrecognized mount option "G" or missing value 04:41:10 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x10e, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:10 executing program 3: unshare(0x4e040680) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000500)=0x9) r2 = getpid() sched_setaffinity(r2, 0x8, &(0x7f0000000500)=0x9) tkill(r2, 0x2) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x2, r1}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000300)) preadv(r3, &(0x7f0000000340)=[{&(0x7f0000000200)=""/167, 0xa7}, {&(0x7f0000000180)=""/40, 0x28}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/83, 0x53}], 0x4, 0x0, 0x81) r4 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x2, 0x2, 0x0, 0x0, 0xc91, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x2c0, 0xffff, 0x20, 0x3, 0x9, 0xffffff86, 0x2, 0x0, 0x7ff, 0x0, 0xfffffffffffff000}, r4, 0xf, 0xffffffffffffffff, 0x2) fcntl$lock(r0, 0x25, &(0x7f0000000140)={0x2, 0x3, 0x8001, 0x5, r4}) timerfd_settime(r0, 0x0, &(0x7f00000001c0)={{}, {0x77359400}}, 0x0) 04:41:10 executing program 0: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000140)=0x3, 0x6) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x1d}, {0x81}, {0x6, 0x0, 0x0, 0x7fff}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00') set_mempolicy(0x3, &(0x7f0000000100)=0x8, 0x7) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000040)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e, 0x0) [ 143.307330][T12258] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 143.385730][T12295] loop5: detected capacity change from 0 to 6 [ 143.397178][ T22] audit: type=1400 audit(1634100070.960:321): avc: denied { relabelto } for pid=12292 comm="syz-executor.0" name="file0" dev="sda1" ino=14614 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 [ 143.429387][T12298] loop4: detected capacity change from 0 to 1024 04:41:11 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback={0x100000000000000}, 0x600, 0x0, 0xff, 0x1}, 0x20) sendto$inet6(r0, &(0x7f0000000140)="9a5136098815bbc713ece584aaf5ce59eb16462b595c2544a074b7ade29df4eff5ee1dd4946054b01395652c7a4d20ea642adc982845f57c36eef3d519ced6d19f3ecc567e89be0bf04012d0fd869eaf749bc9259b5d3c94d75f5790ff4bfd01530b982ad6c40b7ee5446c1a33115aa78e537f942190d1aa4352707dd18b4db6ca42db316e434200d4a19121166812c91ebe3cdd3c46e8903931774db6244cfcfc25d3e0d25a858aa4575ebd8e62929fac29533799f4dabe696e0701953f07b2a1bf10d7876db1b4dfa8a418fa8ee0ce457502312e596efa69ec868f15335e844ba14586113f639fcf78c5543140e43595d47b57a896a00e6746e6a650a8001f87660caeb462925fbf607ee027efbcc2e39e4b02fba4d9ffc4395ee7f1e56e0cacb058e90bdbd1e4afa28808948ae8001d0b000008db3f9fa5c78fe93da6be176d6800d2edcd40f904e32c516480ffa9e6ea0063aeb29a4ed8dfe0f468c978a6ce6ab792af4891a59755c82dd6eb934025251d2bf5c49be409ac79620b82d7dc9d8e49432f47fc4e9e96f095edfb670bd6e422ba2c90638721c8aeebe8a800658590824d90d2d76774d92ebd70199af89625e7b6e08826345a9964715bc7269f8f5e6fc10734af5c21dc9e67a9676a86a3c4d110b9b5ff9b21db032c696398a63f72ce8763de9b8545affa1981ec708392ec80cc6c5d674d93012f1040b7a9669194e9899c06e699516b4d6123c283ef6610fa180e1b2e056a0cc66b22fe577ec6feb1da696a2a81f7252299f8b7ff2420b88fa5f41dd4bc713b7966e6c28d401610e47e81ad460f27f9dbed83de39980b5e164845479a4f91b644da9dd0a699fa1df489796979ad3bbe638aea362363bc149610eed58c32194e03abcbcada882f42fab18b4a74ae7a6ed8f4af2c6d3b077a27718824c4333d916c0963c4cd064aa33ba043ea9c53c83499ab72875774014eb51dabcc66aec7cc6a2d096d1bee042e50be7aec060b79c7b49883b66fb5f20ef29051d9def2af925970f2f61d35c87ff54054fbb6d33db2fd19947c2cb7657c500bcd4b6ed4b7bdfdb03ecde86da866cd5326f1e70ca4f1bfbe72d256558fe5cc837e76c44f07586de3a02b7524ae77e88185bfd00eae0f25c0f903cd9df4c82fdf33d865946d7eb437cc573c4bc5653fa0e458bca334378faba7cbf8221592678c1422bcad550ea02c9683fdc1fe180dcaaad8a759b010966cca5a928a384620f02d52683de799a554705943cf1414fea1ebc0ba3cd5a2579835b4caf7942f43038dcbea1a750957169a6e43daa4084c143fc81ec81769e3d089626db3f14a06ea52dd397533a8290275eb2d26dfb8e164653c72fd0490f940199cae4113215a468216d010b8f22ac01b5b930c433b5222d84e287c899f27476c5a02f41aea3921d0b783d89ceb9ee6c294e1b247e8c9e0dda5b2e3aee67b6dcad9c67e92901caedb4d2642a509631a859971e6b3fea6d3b72ed3e62ca6c0164a0bb118e88087a137845bf2e9b23b8f2392aa0c0fc35093becf5dab43689836243cdacf374631acfe4ca550a56447cf63503189b6ff1b0493fbbb0d19a36fc3ee1a7364d2f8311be6d8dd1166767bb96b22d95988e9208a5b58d4606309339e0c6f7d6387a3b9f2bebf7c2b774f093e5ac2f5e10878aec4b1d4da121350f7dbf4d4074f39bb50925cd918af7e5b4481a130fc68d1e5d37f54cc8b743396331439984fe93b75c9cf39f26f8b4c073bc50bf425de840ed3e591f7c44a7e90e7daec88969a876aadda469d81650ef5a98a0b39604c97568a7c0c6d0b4b0c3697116d1909e200fc0575ad44547aaf191484dbe6c7cbade34f979ae258a00a5aa1e7d1f44e64f5a68ff8ad952083788517b30d67407a98dec0db9ded5898a4e7ccd00b5049108960ce1ede2da415694119d6040ca983350499589ee6584a416422baa2baa5c16e82829a7b584bc366878610ef643e22dbba7ab7dab7e78c218b3775bd38bfcd21b8c95462c1ec41df1841fff548ba43c8c7449e4a7b63b16206fab00a52e40b737005c3e76d823020b37d8e5ff29605684686fa6a0432c9bf15c80edc34ba35aef1d600d2bc0a720ed9eba46d7c6763fd3916b590f32e442ea49f717ad5ecb90ec71160b17b113a54d6a681482f633ba2d37feca3656598cef2c633ed79ed52979d40dd5a45e23ef436380cfc9a3fe89be2616bb11f42580aa95a2d218a27dbed0829d2ad6af21093341abd42640192a047c96746d512aa239fcd830d105b5b64d100919321c5f58443cd8e65ec0290f85340acc3911052fbe4afe3afcb8b3b1351b375a5c528fe53a57fa75314a059bf15563ac84f3f776a279dd01ba07d27a2635cb13b35a9d03e5d1a5a076745cf90724b8723c06d30aa784e653bd017f289fa7442ebefcb0815aad65d013bdc9b0a8e7599bea37b9bd38f776ca8d35768fe9a616cd3481698403ace3331b58d431ecf7b3159a61d6d7c4177f713eae0ef06b72bd5750c1fa69337e3fa336fb6f432bc8cc3348b8d248b4cb19b564f7f9cf6f265dcc6bc14e4f413736863eae1be386b1d94a9e5ba16d4274a71a44b837a5d64b19a5e20ab8e60466f65214669aceac0eebac971b571a17a0e0645d9fe88fd4e220f04c83b219fcc2ad9bd6e5df2b1ef4d0cfe9e6dd22c1b543aa76ecf038dfec8eef0170bc06c0f698ac97796381f62e94d57fe653358f58c509ca27996004f0d04d0e9d3b7fd81daab385c1a1506633ff99f94ce4db80a2e26ab5078ce2f5f9029b5c8d5d671c34e5271e4534df722531328443a0d6d37647918a6fc4b1e8d29f1f10966e22259a066d0e7f5322378513c24bad4372477af8b6bf083affbe723ddf345e8fc85bd406d40ce2da9b74a567651d8bd82ad8ee8ed4d187a296537807430b6bcaed808da118eec55e8e37dedcfe1f885d4fabc224f9c1e1f90af0e6cef51b358c8efc0cbb7ee0bae81b37419428e8d65d93300b7e93a0eff7773fb219f36daac0a4748fc5736a914a15c7d3bc6756a610a1365001752aac0f490f2cda752e1dd6108642850d5e7576ae5ee697a0d3270156ac63d8a15f1528341483496b84a0ff86773b2cfb49d3419ddc9b653d9e293f657ca05e8bb94b77fe606f4d21b6589529186989313ade17021700b54bac51ad1ba20a6fe1dfc20679faa97f9d851438db2ecdfb78db800bc6075c8f1403080d109c02abb074d0f98967f2a8c72cd8b13953fd2b7f3b1c01322466f479d60759274d3227c3d57c0b6a32b8c42661ce1d32c83ece92929b485b8dbd03e17ac528f3d507482e5e555548244e9c018f791c60fc8f053042a613d5f2a40c5956f21d40a66b7dfa1cefbb539df4a8e4ead33f81116faea58f103313400bf562bc3ff3756f9e452a7b6460b94c15901828a4f551d86cd63013469f85fad87768d0cf7b28953d6cc9c5862b4cf9789c79ab8c1d05bd92b5fd07e9d3c442f03fd086dbbb1727579f8a8b326326700d9bb1b150432c381a4c2561886696f3413f3718837b56ee5c14002e2b06f6ee95efb6bc68687e124ab7075b3353fca88f7eff83e849c833f3d7b5a064e010b6d7998da14e87e52e36c6218226215fcd579c921401b431dc3667d086b7fef73b270240f7336e655c326946091a5b8d9f73eb586a0294e0a90fc04902574d213e2ccc2487e8e75e9deb74569da1878ccd3810e7bec2fb63dbf545c4387da5c258308330a7d6ba7924ad3f7aecf77b2ff8f559b670c2fe086f9044803d31b6869b474ef0de771d83f310a723efc9e298881913afa085e49123fd66a8121c41906cc9dd82ae6d5e672540ac5d84ada1629e9d91755ff92f4d013c2666dd0f5113865ce39d8b47802fa6fccb0a2bd5482afa3c64f267c1f1798c399f66d160d175b3cdc65d44ee9401a96369627594d965dd7636b2edcdcf04d1eaec062c8377688fe1eaf390837eb0f350ef2198e202ccac2c1537a6d0b404857cc27f6cfa2491bf1a8942eab93accab657792aeadba1607e062bea2a44f107fcc2439081f9446270f01706c92edc3be9488abc90e2d547dbd30df3c94f97361399be927973aef7f760f3db06ffc4f61076480d039bfca394cba6947f10e07bb4c7114f6f861bde8cd2bcb749e05c6372e22d71b759d4433af38c9b5f77af28b4b3f0579450216e7242a9328bce6d120392da95e35e2444479132474cbbdf4c2a34ac93d4ff13f5737828c588f8a30bcbfe1b5870022a11f7bbf9fcd8ebcffbdec17366e8c8e84408a448d975d23c9d66279b2bd60e6cc4e3b36a71cb007393f163d2ee8a0e1c2de69ffe24efac38ca797e7f3fff057ba58bfc271df4b9aa61892db6a53fc0882ca47ddc687ea0cec2ed1922407d39117d2fe4191c666101928bf6595bdb594a8bbe7a72f171b12615b26d38f7c6c1c3cc5a5fe8558a66b11b7965a2900b92ed42c073ae21dc47a17ba276b1e1f58e6f8470c08133f64a1d875c8e7eb38df30faf14b9da19ca6665a4a14827a3f4275f121c41585ce197eaed60777253e68a6db610fd3b0a2ad5608ddff91dca6f0c1df4ef80bd9661420c2c675fd6626f4084a84c7b9bb0b3f34d2a2021e27c0b86ffa34b0edf35f4697f9c0f1301ee74d96bdf86e7c8e16eb02b00065000700412516ad5439e5037bfe57c74d1a9bcf0ef153862bcde5046b172c89eb73c1dc9a0370606fdf4feb6e47d4b8de0eb4f34113ee174c4d5db96f6b3192e39cf73fac26f2bf2f3a459879639925be487384d94954e5a94b96806a67c98c8211eb3a971b622ee2aa94ecd62ff44c473cf002f3d49c2eb0999f18c7575e6296b7e31b1385db00314ee1c2c1c90f947ca6d81833faa602c05ef2cc6a314d4ded5b9698f2e538db53fa4055ebb6e6266e5d9a99c3989d0033448228abdd3d435ea340335bcd1488a1df0045ac10b73279e8b963e1e041455e35bc49626381ca3af6ddafe6ce41873f20f1bc0946e02f13171510227648b7607c6281551cdf27e3c85b948481ca6d2128328581ed9dfb4f6a794c12680c3ac7f762a1ea5d2e80f4e668c1b14335dca94042a0c26fe9cfc4b4a101cdd95aa7e2fc27df759ef4949a8385c515f22359d6ec1adc765f291daa19fb83ce30678cf3bcc1a2cc434a0baf60f5e47ba597802c4068468793a6dfb9b10a9c1c59f9dc2ed4e98fb052c79c243b2cf06aae3d4bf12278daa36d7fe14df11bdf23964012de07c6dbcfbde7d13690aebbb95bdd9454622558ec835a0cb383094c2dab91208283015b784d120d09edca06a6005e32fec89d2883bd84c39d87b3f9523fe92bc383ecd4bfc3caeead97f8125aea274d5d616520fb3ad94aa2263face0d1bf8d24e0cda822639104b19d56679613a81cdce63a7c0ff3e2d69f18f6c43b5ff2ca30d1cadfdb8acb9d8d2c117a1df1a70446a16d86c2bd23948e5b1d5cd9fbd80d86644b81e59501ebedfc756961b81e1b95d64b7e676f6fe5c4a97ac35bd3ea91d654f305ef265f9e2db12a4ca8d4ddbbc6e8c04d91140a87163b3ff4d5df3bb34e1144d36db42d92437b8d949f9cca59ab7ec057c7950b959ae92e7e1448c579995edbd845e4f0538e4530b80626457f5d23a0403f68e3a619aa2577f50e4176dfeae28fc0a60fec1eaebd90678fca83cb277fd77b7c99594a09f0bddb423f0edc8dd1648fe2201b8b70a2c77f2d302a6aa546beadcf58479575b02c0cf0ece7ac403ddf524888c69638bf328229bd13776546b96f088a0f525c2729f02313db515f1ee6494d474189df4c42814fe", 0x1000, 0x20000800, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1, 0x1, 0x4, 0x81, 0x10}, 0x20) 04:41:11 executing program 3: set_mempolicy(0x4005, &(0x7f0000000080)=0x5, 0x2) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x1ba) set_mempolicy(0x8000, &(0x7f00000000c0)=0x5a8, 0x10001) set_mempolicy(0x3, &(0x7f0000000000)=0x8001, 0x100000000) set_mempolicy(0x8000, &(0x7f0000000040)=0x3, 0x3) io_setup(0x4, &(0x7f0000000180)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000380)=ANY=[]) set_mempolicy(0x4000, &(0x7f0000000140)=0xb99, 0x8001) [ 143.443969][T12295] FAT-fs (loop5): Directory bread(block 6) failed [ 143.460607][T12298] EXT4-fs (loop4): unsupported descriptor size 0 04:41:11 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x204, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) set_mempolicy(0x8002, &(0x7f0000000100)=0x400000000000003f, 0x8) r0 = syz_io_uring_setup(0x4956, &(0x7f00000005c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_RECV=@use_registered_buffer, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) execveat(r5, &(0x7f0000000240)='./file0\x00', &(0x7f0000000700)=[&(0x7f0000000280)='\x00', &(0x7f0000000500)='\\\x00', &(0x7f0000000640)='ext4\x00', &(0x7f0000000680)=')^:[\x1f)$*%}{\\.@\'!$)]{{\x00', &(0x7f00000006c0)=']@\x00'], &(0x7f0000000880)=[&(0x7f0000000740)='\x00', &(0x7f0000000780)='\\-\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00', &(0x7f0000000840)='*\xbe\x00'], 0x100) syz_io_uring_submit(0x0, r3, &(0x7f00000000c0)=@IORING_OP_STATX={0x15, 0x0, 0x0, r5, &(0x7f0000000140), &(0x7f0000000080)='./file0\x00', 0xec93c740d39ceb8a}, 0x2) clone3(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000008c0)=""/232, 0xe8, &(0x7f0000000400)=""/211}, 0x58) 04:41:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x20}, {0x2}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0xd0) [ 143.530380][ T22] audit: type=1400 audit(1634100071.020:322): avc: denied { unlink } for pid=1115 comm="syz-executor.0" name="file0" dev="sda1" ino=14614 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 [ 143.558125][T12260] loop2: detected capacity change from 0 to 1024 [ 143.566039][T12260] EXT4-fs (loop2): Unrecognized mount option "G" or missing value 04:41:11 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000102c0)={0x3, &(0x7f0000000000)=[{0x1, 0x1, 0x3f, 0x1}, {0x200, 0x8, 0x8, 0x800}, {0x7f, 0x40, 0x3, 0x19eb}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x40086602, 0x0) 04:41:11 executing program 3: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file2\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)}, {0x0, 0x0, 0x10e20}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'default'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) open(&(0x7f0000000080)='./file2\x00', 0x400000, 0x180) 04:41:11 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="64656275672ce8"]) truncate(&(0x7f0000000040)='./file0\x00', 0x3) [ 143.619582][T12340] loop4: detected capacity change from 0 to 1024 [ 143.649645][T12354] loop5: detected capacity change from 0 to 6 [ 143.657795][T12340] EXT4-fs (loop4): unsupported descriptor size 0 04:41:11 executing program 0: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRES16]) 04:41:11 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x300, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 143.693219][T12354] FAT-fs (loop5): Directory bread(block 6) failed [ 143.702784][T12367] loop3: detected capacity change from 0 to 270 04:41:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:11 executing program 3: r0 = creat(&(0x7f0000002b00)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="08000000020000030000000000000000"], 0xc0040) 04:41:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="09000000000000000800000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000004b3d3b544c45a1b7557ab987a50fb1abe69a7137b50365da08a9c1b759374e6caae78242ab9739ba4fe3a5d39ebe325653ec3cff03000000000000b6a0980037b91047e39a678f86b359808bd530330270967283318005f805a2720e3027a2238580bcac255972629aabd0f32471efa58ab805b375a4e6283b7d115ebb27b23b8704938b31"]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004ff00)={0x0, 0x0, "c319766bd7a29adcb92f8dd9a9eb79d74c020ed54623cd45f3ad56132b9d61d9840f110c2c3fbb05fa31ae7c85520ca47caf17f8a7aaaa645bea26b649ba430b1a1f15344c27a536ed8f65feb0651ebdc41e424e233df4e31bce25f73fac4afb99c75a9c03350ef254500be0f677e0b3492c498667849cd357062f9eada91539e1b8dcef3ced3374e64544a8bf2be4ec5905d12c6992f5b20a48be7d6d74fc2df3af65cc44d7321b48fc2e65c4572908b88ad95646d2fc35c2a8944b411c4640391e7834fb0255156ed48bc6859dbfab66a061512788348164dbfc6719bb074d7fa6b358d1dc779044c8aaf2c5c035e311aed0e074b3c615922cf2974db19278", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000400)={0x3, [{r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {0x0, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {0x0, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {0x0, r3}, {r4, r3}, {0x0, r3}, {r2, r3}, {0x0, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2}, {r2}, {0x0, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {0x0, r3}, {r2, r3}, {r2}, {r4, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {0x0, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4}, {0x0, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r2}, {r4, r3}, {r4, r3}, {r4, r3}, {0x0, r3}, {r4, r3}, {r2, r3}, {0x0, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r2}, {r4, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r4}, {r4, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r4}, {r2}, {r4, r3}, {r2, r3}, {r4}, {r2, r3}, {r2, r3}, {r4, r3}, {r4}, {r4, r3}, {r2, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r4}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {0x0, r3}, {r4, r3}, {0x0, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {0x0, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r2}, {r4, r3}, {r4, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2}, {r4, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {r2, r3}, {r4}, {r2, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {0x0, r3}, {r2, r3}, {r4, r3}, {r4}, {r2, r3}, {r4, r3}, {r2, r3}, {r4}, {r4, r3}, {r4, r3}, {r4}, {r2, r3}, {}, {r4, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r4, r3}, {r4, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {r2, r3}, {r4, r3}, {r2, r3}, {r2}], 0x2, "2e3cd82f534722"}) r7 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa64f, 0x0, @perf_bp, 0x0, 0x200, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000001940)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050f00)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x8, "2feca407f0f260"}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 04:41:11 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x3, 0xffeffffd}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) r3 = socket$packet(0x11, 0x2, 0x300) syz_io_uring_setup(0x4f83, &(0x7f0000000100)={0x0, 0xf1f4, 0x4, 0x24, 0x24c}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000280)) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, 0x0, 0x42}}, 0x0) io_uring_enter(r0, 0x688c, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x183, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000240)=@IORING_OP_WRITE_FIXED={0x5, 0x845315d39c17e76e, 0x4000, @fd=r0, 0x2, 0x6, 0x9, 0x13}, 0x9) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r7, &(0x7f0000000140)=""/62, 0x3e, 0x76) io_uring_enter(r7, 0x126b, 0x4921, 0x1, &(0x7f0000000380)={[0xe72]}, 0x8) [ 143.800319][T12388] loop4: detected capacity change from 0 to 1024 [ 143.813933][T12390] loop5: detected capacity change from 0 to 6 [ 143.821615][T12388] EXT4-fs (loop4): unsupported descriptor size 0 [ 143.848262][T12390] FAT-fs (loop5): Directory bread(block 6) failed 04:41:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pread64(r0, &(0x7f0000000040)=""/177, 0xb1, 0x4) rt_sigprocmask(0x0, 0x0, &(0x7f0000000480), 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r1, &(0x7f0000000140)=""/62, 0x3e, 0x76) openat$incfs(r1, &(0x7f0000000100)='.pending_reads\x00', 0x90000, 0x3) 04:41:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:11 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x334, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 143.938238][T12421] loop4: detected capacity change from 0 to 1024 [ 143.949115][T12421] EXT4-fs (loop4): unsupported descriptor size 0 [ 143.958643][ C0] sd 0:0:1:0: tag#7366 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 143.968491][ C0] sd 0:0:1:0: tag#7366 CDB: opcode=0xe5 (vendor) [ 143.974847][ C0] sd 0:0:1:0: tag#7366 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 04:41:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000500)=0x9) sched_getattr(r1, &(0x7f0000000140)={0x38}, 0x38, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x200, 0x41) io_setup(0x8000, &(0x7f0000000080)=0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x145802, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000000) sched_setattr(r1, &(0x7f00000001c0)={0x38, 0x2, 0x9, 0x2, 0x0, 0x3, 0x11b4, 0x0, 0xf27e, 0x6}, 0x0) tkill(r1, 0xf) dup3(r3, r0, 0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 04:41:11 executing program 3: prlimit64(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x8d, 0x4000000090}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x2, 0x7c, 0x7}, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x40064080, &(0x7f0000000000), 0x0, 0x0, 0x0) [ 143.983890][ C0] sd 0:0:1:0: tag#7366 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 143.992932][ C0] sd 0:0:1:0: tag#7366 CDB[20]: ba 04:41:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:11 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000023c0), 0x0, 0xffffffffffffffff, 0x2, &(0x7f00000022c0)=[{0x0}, {&(0x7f0000002200)="517f0c360efc84a8b98bae3a07e3cf49d21f78fbc5af084764bc63f25e199e61ab9ad5c6fcbfafad7fb3fc3832db29f3cbb96990da9220c78e", 0x39, 0x81}], 0x0, &(0x7f0000002340)=ANY=[@ANYRESOCT]) chdir(&(0x7f00000001c0)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) readlink(&(0x7f0000001040)='./bus\x00', &(0x7f0000001080)=""/4096, 0x1000) sendfile(r0, r1, 0x0, 0x80000001) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x81, 0x80, 0x7f, 0x3f, 0x0, 0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x2, 0xffffffff}, 0x10000, 0x563, 0x20, 0x7, 0x0, 0x9, 0x200, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r1, 0x8) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) write(r2, &(0x7f0000000040)="10", 0x1) ftruncate(r2, 0x10099b8) r3 = creat(&(0x7f00000020c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) 04:41:11 executing program 0: sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x6004c050) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x80041) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000004a80)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x99, 0xfff) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x80, 0x2, 0x3f, 0x0, 0x101, 0x612ea219d31437ff, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0xfffffffffffffffb, 0x1}, 0x400, 0xffff, 0x1000, 0x9, 0x7f, 0xcd2, 0x0, 0x0, 0x45}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) r1 = request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000140)='trusted\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000240)='/dev/sg#\x00', r1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x0) [ 144.080218][T12440] loop5: detected capacity change from 0 to 6 [ 144.102604][T12440] FAT-fs (loop5): Directory bread(block 6) failed [ 144.113129][T12454] loop4: detected capacity change from 0 to 1024 04:41:11 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x4}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_TEE, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000400)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r4, &(0x7f0000000180)=""/196, 0xc4, 0x20, &(0x7f0000000340)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0x5, 0x2, "262ef3dbecabb656fdecc9786537fb522d04dc8511be0569bf8c334ff7605a65597c8017d3a1df10e82eb4e68bc0952e90147a79951aec638e75073a540830", 0x3e}, 0x80) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3f79, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r5, &(0x7f0000000140)=""/62, 0x3e, 0x76) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x20000, 0x0) sendmsg$nl_netfilter(r5, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0xd0, 0xb, 0x4, 0x201, 0x70bd26, 0x25dfdbfe, {0x1, 0x0, 0x2}, [@typed={0x4, 0x92}, @generic="0ab272ddfcf6e784ac3469b0db2c84fd27cfd95b445c57528e362f14bf85100f99b90678fbb044fa2d4a6a637a923fd65bea5bbed56218a29648f9a28618853cc7116049534242a956028fca6219692502b23c096731e651bc9958f8401ed74227491de082ec407a43c3f55d6ee03c53965a712e9110050318278f2310d7219a56f0cf7b2e9688d25e3e5ccf2795b79dcca0b12a23f021c3a5d74f9cae226118b51cbe36c0fe3b5704f286dbebd2f47a", @typed={0x8, 0x11, 0x0, 0x0, @fd=r6}]}, 0xd0}, 0x1, 0x0, 0x0, 0x800}, 0x5) 04:41:11 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x383, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 144.159603][T12454] EXT4-fs (loop4): unsupported descriptor size 0 [ 144.160060][T12460] loop2: detected capacity change from 0 to 512 [ 144.193548][T12460] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 04:41:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 144.204886][ C0] sd 0:0:1:0: tag#7381 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 144.214749][ C0] sd 0:0:1:0: tag#7381 CDB: opcode=0xe5 (vendor) [ 144.221095][ C0] sd 0:0:1:0: tag#7381 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 144.230124][ C0] sd 0:0:1:0: tag#7381 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 144.239242][ C0] sd 0:0:1:0: tag#7381 CDB[20]: ba 04:41:11 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) write$P9_RVERSION(r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) stat(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat2(r0, &(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x40000, 0x20}, 0x18) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040), 0x282422, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose}, {@version_u}, {@debug={'debug', 0x3d, 0x7}}, {@cache_fscache}, {@cache_fscache}, {}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@dfltgid}], [{@obj_type={'obj_type', 0x3d, '['}}]}}) [ 144.275795][T12475] loop5: detected capacity change from 0 to 6 [ 144.281931][ T22] audit: type=1326 audit(1634100071.840:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12462 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x0 [ 144.315783][T12484] loop4: detected capacity change from 0 to 1024 04:41:11 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x388, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:11 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20}, {0x20, 0x0, 0x0, 0xfffff028}, {0x6}]}, 0x10) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9eba6faa00001f3bc89fe70000000000000000e0e72ce748a070db1e229fc0790c1e1200"], 0x14}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) r1 = getpid() getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [0x3, 0x4, 0xa4, 0x5, 0x8]}, &(0x7f0000000040)=0x78) sched_setaffinity(r1, 0x8, &(0x7f0000000500)=0x9) ptrace$setopts(0x4200, r1, 0x6, 0x100001) [ 144.333050][T12475] FAT-fs (loop5): Directory bread(block 6) failed [ 144.342023][T12484] EXT4-fs (loop4): unsupported descriptor size 0 04:41:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 144.418265][T12505] loop5: detected capacity change from 0 to 6 [ 144.450867][T12514] loop4: detected capacity change from 0 to 1024 [ 144.468554][T12505] FAT-fs (loop5): Directory bread(block 6) failed [ 144.482478][T12514] EXT4-fs (loop4): unsupported descriptor size 0 04:41:12 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) madvise(&(0x7f000000b000/0x2000)=nil, 0x2000, 0x65) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="ae885b10240b0000010200002052caf9000099f0f60e00800000901a4aced6f7fefffffffffff5d5962cc573f3fc", 0x2e}], 0x1) set_mempolicy(0x1, &(0x7f0000000040)=0x1, 0x8) read(r1, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)={0x124, 0x32, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private=0xa010100}, @typed={0x101, 0x0, 0x0, 0x0, @binary="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"}, @nested={0x4}, @generic=':']}, 0x124}], 0x1}, 0x0) 04:41:12 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3a3, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 144.594238][T12528] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 144.603545][T12528] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 144.630251][T12535] loop5: detected capacity change from 0 to 6 [ 144.639237][T12536] loop4: detected capacity change from 0 to 1024 [ 144.666864][T12535] FAT-fs (loop5): Directory bread(block 6) failed [ 144.675245][T12536] EXT4-fs (loop4): unsupported descriptor size 0 04:41:12 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3a4, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 144.772062][T12556] loop5: detected capacity change from 0 to 6 [ 144.808523][T12556] FAT-fs (loop5): Directory bread(block 6) failed 04:41:12 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0xdf, 0x1b, 0x3, 0xb2fc, 'T\x00'}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800002, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x200, 0x286400) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000200)={0x16, 0x1a, &(0x7f0000000180)="7d8aa3480a1cc92e1f05e7563a47dfa2d4c366f6b3d09e8204b8"}) shmget$private(0x0, 0x2000, 0x100, &(0x7f0000263000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xee74d679fd12cda3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe}, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x3, 0x6, 0x3, 0x5, 0xfffffffc}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) mkdir(0x0, 0x0) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setrlimit(0x5, &(0x7f00000013c0)={0x6, 0x1}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) sched_setattr(r4, &(0x7f00000012c0)={0x38, 0x2, 0x1a6768ca2b7d3ab0, 0x9, 0x0, 0x5, 0x0, 0x1, 0x1ff, 0x3}, 0x0) clone(0xc0201300, &(0x7f00000002c0)="4da0f0ef9544ffbcacd19aaf9167598e7ad2b92831096936839371cb9ef65513276ca2e67855f5ef5a0eb25b9f09e4afd4757c8f3c47ecd73b8df6e10cb41472a2cd48e95c48cd96bc80521b040a10b6129c785028edfd56e72381f77d51cce983bfa51601bef4083197060c1bcdd3d9bc34349e28684f40002f3da532f1185fce3370c6e0b988f9fdd3894992fb2b5ba972a14eae1287578e05de20ddfc4e876c915a7f81f83605a18d0f8f45641a09df92501a6b91737c525b791436f2e1a5f5e8ea8e5efd6b72f6066b4e4814f20ec78d568ac90804dfeb75431fd1cce72f7d8ce97baa367272a4ef6daf3cb411bc32f20a8d1f9191c937cf54acc5406bd9af612299f5c3c98977b87dea203d45d98adff2385ec399f3df38b82a07cf4044c5b1dc1d126030137f20bd3d32e8be5a02d8e3d98997a43903e6fa4d287f6faff9e88658930e362485df7a40ce0b8897ea9485656881d3d9723402f1a709a1fa020aa4a1766e41891720ebd23d131f43ce752a110854502bd0ddf78fcc2ba3f638c80ba8eacba58ef48d1d2a64344f602b849c87787f59f5f88efa72e186fc0058a8f790eb3a1e7130f94d84b6e13a6505d9e375690ba8543f569b8bb1c8d3a62f0b2bcff9d1fa112eaf89159d893befc53b24d4a4732ffc9d3b3944e8b895756a87cc8b94908e1d6e3abb34d24b39264be67c03a745906278be3b3554daaccc81255a6353175a8c932dae202ce0f3ea68015a978cc81ffb7fcac7fe29b2852d0dd4a491d400360048415a1091dc11bf8e94d4e142be5c32f8b74f66fe73cda5aa8c4bb7714cca5e462d1d22fd2048127ea5619b53b074fee1e81444ea2d08d638da841ba9683e80aa0de3945900971bcdbb32d6abdfa5c41c88eb89c9922647b0705ca267fd43aa3a83399798b0db776cb45748f0d7a2e01ceb6f2adf79a7f22e746ef9cf461516754aa9ff7cf13d0e9dd0f8207ee9900694b1f0cad683cbbd25abf0e4345e13d9eb4562b65885a190da63a954374812fa416b54bb06b5e80a223601058d2d6c2dd02684cb3f13143fe80cd67a9e1ce71d234d5a983121d2a6b8a665fefbdd4a32f0874d819a6ee38b5ed13fc6f4c693ace80d42e5120d86e8d3528fb895f83a1502eb190f131cc14cbb645e6d99d8df22768c602bdd780b8f4c77107f17b531002265668c1b102f0098b41a6a490315012e9ad9e26268f9f773a03e565f1d39ecb65ed23581300692b62a13e2de435b1db86337eb6499455dccaad94536dbf325e5dac61d7287ed29209349e53a0b37479135d06116085fd55ff20dea5626fb28c09651749d562b3d3568119187b4dad67aa31f874a783c51081dec3f1942726f8ebf72a82680842dddf5c799334fbdf838848ae4b6e3d52fe2fc7cd958e60c9320ddd706885e96b9f05616148ebebd7984e72265bbcb9865523b146de7df9dc1b5bc8d181671d1117a6c86d7809b1bcf0aa3328a888b13ff496e1513968aa03898eed8c25c7122df6e4efc4c23f727342cc5f4d7503b2f01c8a9912bd488f0f3fd28f64e5c31c13277179f5675c97bb7c4a717a9be5d9bba66c7dcb025f2186d82a390a92fdcbb05c3565361f9ce38cb1f7e19b9b67e5dfce8065e14675abce7e31544a45e1373c9c77658d3f1a18b1b03920eebdc3540c591402d97b66c4abb32046a7d74ae57ce815e1ade7ac18e619bca24dc10d4da166b3e3e4a6c0bcf833fb923ca942d0c95529f39b9fa4c181d4e34838e3111094dc0043d770a8ff224f67c2fc468ef7b6edfbd73e88eb02efc6ac2bdf3f1f788753398484588fcb78cc099fd97af65ca14578f4ab13de0001bab45c222ca063ca7944629ac837080502d1e7d1ed0ea426c84ebfef0763fded881aae9192db12d289557581f8225fdb56199f2c5fed5076e15dde87a38aa028e0fe5451a9bb7caf35449bd58fcdbc776950ed907310bdf36294a523b8165b90c34165078b671c1ce13493f26b48987cdc35a941ba4cf8e7019a9531978c6c856c0c238ba31be3f5042d205a44b0220a3d03592315143c15cd5c040c54bd0d794be480598184e91ba377b568e7fb917ed7ed5b7db3be30a5c4672d1f5747feeaec79bd6dc2dcc19712e97fc0664d3914ef941596969f72f7cd4ad2d5d0a54742c2f2dc3c0f9395192763f92d3da9b9a852365eb7e891c35bedd4529d0f962d33230df21470febb7d33243cf63f4b04f8eda1deee9a24f34199d5bdf5cfc4069b8d5b7023302a51a246800c457d683d2feb558b07177c36a1d7fab6be7dd3f9f829c83fead90963b59aa2a4acf5ad56cb84b9dfe5b8c6dc8455fda213df418aad11ac7996293440a28a43f5de9c5229e51fb0dd8ace9d951301c1095631edbbdb392b731e556d3d1561aabd528a168b9c67eb71094ecf2f1b667e1297b6dc6b9e54be8df508fedfe2723b17166b8633e59374ef13475d45455108adc4f5cb784366c978e6d5998e0f263a48638503167d2c40b3f34f0a196e0e7876beea7f0ef95e0082d369ea9bcc0bc0144e4c9550fa63099ab386f5007d3f1911e0d9468fc36504742fb536432a0fc1c8f96dcc8e613eb53a9b6751c8109726bfdcaaf0cce9ec35eac1ffbac9cf51edbd3eaebee646035047b6a237d13fae2dce9530705803dc1734ba16900399eb5c7f0f4e495cc5f1c991bae135baa92e9f4dc88b05af017fd0dc0c861c8145d8b8987a4ae7469d7ef97e5694cd5b18e13a32fd428a4fa20fbe426055d1602e687752f17881c901f4c847c30ba5d42e73402250dd2a4f7c8abc3d2ac4cb7e64500253a2656353d4ff425ef105c6e23277176edf3cc7170736f88c6a8a637a2679e4fb190d8e384479000ae333de709f99bb6beffff18872794fcc571f32ff2d8b3ec2cb6f0c893c0ca73397e795f059281fdc790b4a0eacdef3632c486010a3e4e471f9dc6ac567b0b07237ddf5dc07912cd110416ca77adaec130d7838f8eb0a16f71619e415bc7e01cc715172a2871a34c38de3e601a948ef8c575a3740f8a3975afc4efa28ba3a2acf1d5be9ebe16e3df97e957b7c7fc3e3de12b9aca2eddd5b858d03900e9ca34ecf6621796e2b2b96be583e4172d3f8ff2cbe70f67fa198fd8fb0657fba3b078ab569dc9c8348191f35c0d57279e2ca34b310dc6f5b7ed117fd27fe23f5c4266a91f5e1915fc452021622e3f010758168d8782556696c867cf5fb2156ac26c804734b082f767bf7834b3cf6c969716ffc2e609070e3e23a471df5f68b8de05dea591b263e5e65abadc689a7daaaddea8a9c3c96b77872944f2647ff4f3fa221ce16ba798da561bc82b967c544ae2c2129a747d16bf4f241d990661357d9c3bb9eef62079196f75380c5e19518dd63bd00d5266bfd4ebe573e73002344d074b2e3a3134c5aa48a89d5b4f442cecd9dbebe4a8443af13ebb33727673b23ecab350e8f457481bd3a148d38208dc079eac28e00cf20fb48b008d8d55d171497862440a5dee652261ddf5782b030cd8386523c44dbf9d0367ea4882e740a22386bac6bef945697188a0e2ed0782d9d3565a50267281262e7287cea8c511a2a8d9f7effcf7d45806f5aa6b97a38857108bbd51a64d92c784ddef35a84b3becfcb5e39a7cf2a06649f67226c97eb1045f818ac9b151dd694a2be67ff403bfd0bafaa20397ba20378f9ff99f31e530f065676aaae28a12de3b42f46b7abc6f60d99173c3c5cdb26420b9ebdadb98057abca531377f5fea506bf1236264c34fe2e54ea1af098cccc5c4666de23a78e5a31e1bf68260feb735d0e996473bf548f08367e5e20e6188a1fb6a508945768c3e29ec797580c077e6d6cb7410ba35204a38cf7fc9f0f6231d37262e4cc66b93318cdd065b0980016374ac9b52a53c1ba5977bda1115990c5d5c1a4acae06c3ef86a1fc5f8a8e9940f974e5d583abd4182c29d8b4747898a1708e02cf2b42baa28cfe868e9bbe4063b52208582669dfa83fac00369a744175bfc056fe291b5a2638a29582fcc89b9961e3607f1f84861f161a2e734e80f6bf2658f4b07e22242c0d712102f8a1a1086ce5706c8ffe4fb9bb3d1e7b2df930c0945faba291e4a2805f7ef9035aaced5c1a3435d5cb93b01be58c284d6c831c3cf37c5acffcaff40fa90c3f64b72d2f8434deeaa6047ba6dd89e4037d7ee0797928bebb1c2deb84a93d3467a7f578c7848f11f88e98fa6ac0adb65a5676ca03990564b03816fd387ae20749f8c1b56b5f8081d99167dc89fe139d80c408c3d46abab75c8f3d4e969077f7267bfba59d3fe9c174dbd40541e7cc31d6faeec0031afe3389731da439a48216ec66c5339983ea2096eb948869df4a1322c7346a949289c2f15feae69a9d3bc5fe4c7b767e21ac2e64ef2cad257c6ea45f0172812f22a1ebe19f5f97b223547bcf20ea669359965ed5ef3cdf3c5eb9ace020d265e72167c78c39d6b873b0b2670228e00715a90e735306274593625bada8a0c284b351eb7166927db6b40613fe38c3528a69b0dfb1d45a0038acffbf432c68e05930a87e3468ddb4577aad24008ea1a6100e5d2d580572c7e4d182325460a404d09f09801dcf96382952168af0d9c24c756f1a58279ae6844beb66cfcc123a919e71c7a5e76ffd48f626cbefc2f5a6c3f4473169542bc04e91ddaed6f6455762142fbcf69eca09233cc9348683c92ef6f64e7087b57495166fa8dd217a037b6627656d064d1563524dcb82ad2a78d35f3470dbdd53882bb3aca0f414e9671fa61c4c43f340db02f5e09cbc2e5b03d9900bc218a797c1653b33afde4d3d303399730813e7a91e0131f781c95d302b8bef12c99c53601fb2a3b660b36cc2adacad317cc56965718c11817bcc04f13095796e1e15355bf0862703d5ca103271775449498009d462527c3454aa70e056150a91519d8dfe90e8dc041135da327bac9ad6d0a2bcd8fa97576a7530f12b67cb40f22cb94db5f39b39f8353792b33e465568a26286b2e79796785b8462ff30c967c112b696809d6468efc3b0afe34064973d6d6ff0246049bbc33b0ae33eae4ac02998bedeef1d63039dfd76fad0ea4fe90a8f53d547fd9b825eda8ae46b62c530d176f5fedfee8d3fdc4bdf102dee81a7339f3b8339d2b56a4a4d28fb3b6562c5335c2605682caf1847c868edf555e2a99326c04c211aef1974e831f53994056732f6f2447e94b2899bc6cbdc7ff76fe683b5536f54cffaa94e539c795b1f29131b5328f3de549e39470dda705402a3269890c00116eb402dd9272a45df635bede7a2dfeeefb3af31a8930e575111288af1c2c9651a2877914fb4d3acec6b6ba3b08fef261fdf21eceaccd0eea9dc2a4ff444182aa4586151fdfe5935db8690d0bf1982146b0cf7c033781ac78f582122986990eaff6e51cbe39ce7b12e94e684a59a9ab80597382e9d456d5f43d2a32b6f3318cc9e85458c55a48867d49326b55814e77b702e71e76db59a56f6a5f463b2991cdd5ecd277366a83ba205d4a285ee65088faefa214737f9141f3092c776f4f042b4df714febe17c4efcb7245cd8f803be85c0c6214ec25209abf8b50a2cdc9ffd4f59d1e700451e73e6554346a4675f82b6e77073a74a426885d07ab5355f6f4669cee14a7ec6032c35743d92bef8b13867d28c2673ddb7645786030ccef60b8a890ce0e596b361e04e82dcf04b548e162974dcdc3e01f311a64a99089d2085f954979bf0b368b6c1c21f4f45986e1989742b3a8f6527c80e9ba742daea1a4f235686cd892c24ede8fb1ca462b27425f78f8bd83", &(0x7f0000000240), &(0x7f0000000140), &(0x7f0000001440)="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") 04:41:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606", 0x1c, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:12 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x5, &(0x7f0000000140)=[{0x1, 0x82, 0x72, 0x8}, {0x1, 0x20, 0x3, 0xc}, {0xf001, 0x1f, 0x4, 0xffffffff}, {0x1000, 0xff, 0x7, 0x8a}, {0x80, 0x42, 0x9, 0x5}]}) read(r0, &(0x7f0000000080)=""/83, 0x53) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 04:41:12 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3a5, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:12 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14, 0x800) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000240)) sendto(r0, &(0x7f0000000180)="80e9a8bf4ebc8264c45e", 0xa, 0x44804, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @qipcrtr={0x2a, 0x2, 0x7ffd}, @xdp={0x2c, 0xb, r3, 0x37}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7fff, 0x0, 0x0, 0x0, 0x2a5, &(0x7f00000000c0)='ip6tnl0\x00', 0x2, 0x3, 0x4}) sendto(r1, &(0x7f00000002c0)="dc8b3e3f774288280e59596335746961691c0f9a34fff22162ed89e9fdd83053ef8a14cdfc6e1487871d978002d060e28fe1a13be2b8be65faecd232647d026f4e2d04f624382f6dbc0776e27831d1181537152fdf22a8d5f0af545360774579e7f1cc7f5ba339c6eb52fdd83c18e323d96292299c92057fb392ce32d5c7675aad733cd06536f461a76c3eea3a17be93415eb406cdb58d301f66bca448e2d7a27b30b2af61281374d04460ef309c1a00f19ab9f82301b2b7cf712c93ce5327d1b044e86427ab0a486b62a22c8d035232f3592fadc9a672", 0xd7, 0x0, &(0x7f00000003c0)=@xdp={0x2c, 0xa, 0x0, 0x2e}, 0x80) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r4, &(0x7f0000000140)=""/62, 0x3e, 0x76) r5 = pidfd_getfd(r4, r2, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r1) r6 = gettid() tkill(r6, 0x7) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000440)=r6) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) [ 145.026446][ C1] sd 0:0:1:0: tag#7319 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 145.036300][ C1] sd 0:0:1:0: tag#7319 CDB: opcode=0xe5 (vendor) [ 145.042649][ C1] sd 0:0:1:0: tag#7319 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 145.051691][ C1] sd 0:0:1:0: tag#7319 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 145.060707][ C1] sd 0:0:1:0: tag#7319 CDB[20]: ba [ 145.122310][T12583] loop5: detected capacity change from 0 to 6 [ 145.130028][T12585] loop4: detected capacity change from 0 to 1024 [ 145.148086][T12583] FAT-fs (loop5): Directory bread(block 6) failed [ 145.156997][T12585] EXT4-fs (loop4): unsupported descriptor size 0 04:41:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606", 0x1c, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:12 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tkill(r1, 0x7) tkill(r1, 0x8) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="e7b1dd79774068f4d12b0000273ed348f17d2d4b654b4908cc914f09000000fb3fe8c53d8f111058f9e14b775d8880e726a8ddda8d3d153928c0b158143f8200484b5bbc835a6325056e21e6c41923134ae6c5a26c1c4029134177dd6a80d723846bf61845c33ab4cba642ff430723b8a6e17bff010000f7518815c52e6b802283820a671c1ef142bf0103a79b2b292810754534c1792a31b85ba35e7dbb3c0a71", 0xa1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7) 04:41:12 executing program 3: r0 = syz_io_uring_setup(0x183, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x10001, 0x0, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_LINK_TIMEOUT={0xf, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000280)}, 0x8) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') ioctl$int_in(r4, 0x5452, &(0x7f0000000080)=0x10001) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x6, 0x0, r3, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 04:41:12 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3a6, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:12 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x21f6, 0x7780, 0x6, &(0x7f0000000140)={[0x3]}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="100008005822875340eb4c0bce472b13c560cda37ddf3b3aef24b979b8c1a9045cbb3d2241c2893be152f5c30a7324dae0076b5a88b072ed8b368fbb894bf2b5584fd3066b5ac289be09", @ANYRES16=0x0, @ANYBLOB="000000000000000000001000000015000300", @ANYRES32=0x0], 0x28}}, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r3, 0x1c8}], 0x1, &(0x7f00000000c0)={r4, r5+60000000}, 0x0, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000180), 0xfff, 0x200) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f00000001c0)={0x16, 0x3, 0x0, "88ad208c04c0a31477b93cf149f382ee9705b2dc96db"}) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000300)) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r7, &(0x7f0000000140)=""/62, 0x3e, 0x76) io_submit(0x0, 0x6, &(0x7f0000002980)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x40, 0xffffffffffffffff, &(0x7f0000000440)="8be817d01c5a4bbab9e117c37ab6aa173c97cd569109c7be3a0ebd66cecefb72385792d0336e038ed3bc3764fdac8e5fe6fe40bab1ff62a9cd8a9c86347ad5d8340384e133ba17bc347b8995eddb14aa0740b479b525c78d38bd0de3f5d4b9d0f8a9b073f29f643b104dbd940601de1d09d73d34c4ae43e1337b4e6dd1c9002eb01a65ce75ae8d818c62c3a02eed3155dbe0fe9d45607f165fb4839e2cc4ffede7c0a463b3005fa02a9c7f19dccadf3c04f4da50bfd00226878ce730dd513b283d8cc958abe152297cbd90cbc6d23669cbbe3cd333705e811352bffef26cd2f7abb8615e997bc816373d255d22bd12430563e178a3e7", 0xf6, 0xffff, 0x0, 0x3}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x8, 0x800, 0xffffffffffffffff, &(0x7f00000005c0)="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", 0x1000, 0x1, 0x0, 0x1}, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000001640)="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", 0x1000, 0x401, 0x0, 0x1, r1}, &(0x7f0000002740)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000002680)="513e646b9f17600214a0725e2efa6eda1ed009f33d5b864cd2478bcd5e6e6a2333c432e50645d380e0df8e7e9bd4b77b19fe74dd681e20fa9edd25522ab9e5b0555840d03528ffcc541b79c1cdf38a5bfbc1bc2eed53241b96e4c44889b0d6079e4ae03c00e1f82517dfe54bba49b1b914ceab1110c370c5bb3d8074e98381f0a3da874c396a69a957cad41f01fec2c27b", 0x91, 0x4, 0x0, 0x2, r0}, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x3, 0x80, r3, &(0x7f0000002780)="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", 0xfb, 0x3, 0x0, 0x3, r1}, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x6, 0x7, 0xffffffffffffffff, &(0x7f00000028c0)="5c7ea6f55398f7e45d7233c8aa4889eb0b68a92999866e123bd56ee842edf1f75878386e49550ac0bc0e226382aefbb4adddc72e5346de962096e007a4e410094c785b8f569b586e2d3d38f24124b85b7599d5dd92189cbc250938", 0x5b, 0x4, 0x0, 0x0, r7}]) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x80000001) [ 145.241789][T12609] loop4: detected capacity change from 0 to 1024 04:41:12 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="8400000019001fb2b9409b0d1b809ac00a80a578020000020004000023", 0x1d, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)="130017", 0x3, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x10001, @dev={0xfe, 0x80, '\x00', 0x1e}, 0x6}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9409b0d1b849ac002", 0x11, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='\'\x00\x00\x00!', 0x5, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000000c0)=@srh={0x16, 0xe, 0x4, 0x7, 0xa6, 0x0, 0x78, [@private1={0xfc, 0x1, '\x00', 0x1}, @local, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00', @rand_addr=' \x01\x00']}, 0x78) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 04:41:12 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x170, &(0x7f0000000580)="8d31e183156939000000e28c0b1dd2a357b265c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13830c1beaa1b4dc69190f8d2802fab69347b9a915308c4829b4b43353c485f8bb2965cd7e1292aaa6375f12e594a37c9686d403d3a823ec2117496b2dd4837334f03eb96a9c79d3de0cab4645adde76e8ac90dba5bdc53cdc3235210b2e25ce7dccfa31df4f23e22471e2d53415f8f4151d0b915d0c68708733778513261f1e9a548b33b5e8a96381e1d1ff7adcc95d49b4e5a7f1497d726ba6d35a0c89c4b200f63c0b8a455a19c00994f30c13cd0c08ac368d2d3e0423f0959abbe34ea129b4beb505903dfd43cf81e8f42776760740ecfdc955a9861272a4496259440ad7b27dca31131ee26e63cfa915f8bc9d882bac722311fec2ac77c5406cac29b359648c28b4b45e7f0bdb27fa848cedf1d17ccc980ced547960a5e51aec3fcf730cdb9776ebee861deb97c6904b8b6c0d0685e1f7d405f8639d72603f73dbdb09e4b876d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x7) tkill(r1, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x3c) [ 145.288049][T12619] loop5: detected capacity change from 0 to 6 [ 145.291088][T12609] EXT4-fs (loop4): unsupported descriptor size 0 [ 145.310592][ C1] sd 0:0:1:0: tag#7320 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 145.320432][ C1] sd 0:0:1:0: tag#7320 CDB: opcode=0xe5 (vendor) [ 145.326779][ C1] sd 0:0:1:0: tag#7320 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 145.335825][ C1] sd 0:0:1:0: tag#7320 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 145.344856][ C1] sd 0:0:1:0: tag#7320 CDB[20]: ba [ 145.363377][T12619] FAT-fs (loop5): Directory bread(block 6) failed 04:41:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1}, 0x0) r0 = perf_event_open(&(0x7f0000000880)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x214bd, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x84, 0xc1, 0x9, 0x3, 0x0, 0x7, 0x124, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x1, 0xac38}, 0x8000, 0x9beb, 0x80000001, 0x3, 0x0, 0x7, 0xfff, 0x0, 0x8, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, r0, 0xa) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r3, &(0x7f0000000140)=""/62, 0x3e, 0x76) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x20, 0x9, 0x20, 0x40, 0x0, 0xffffffffffff7fff, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x0, @perf_config_ext={0x4, 0xff80000000000000}, 0x1000, 0x8001, 0x6, 0x4, 0x77, 0x1f, 0x4, 0x0, 0x4, 0x0, 0x3b39}, 0xffffffffffffffff, 0x7, r3, 0x8) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) pread64(r4, &(0x7f0000000140)=""/62, 0x3e, 0x76) r5 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f0000000080)={0x20000007}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x12, 0x2}, @ramp}) r6 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)=':%-)-!-,/#\x00') write$char_usb(r6, &(0x7f0000000040)="e2", 0x35000) 04:41:12 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3a7, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 145.386542][T12631] netlink: 31 bytes leftover after parsing attributes in process `syz-executor.2'. [ 145.416879][T12637] netlink: 31 bytes leftover after parsing attributes in process `syz-executor.2'. 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606", 0x1c, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3c, &(0x7f0000000180)=[{0x34, 0x0, 0x0, 0x101}]}) 04:41:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) [ 145.497006][T12645] loop5: detected capacity change from 0 to 6 04:41:13 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3a8, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup3(r0, r0, 0x0) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x1000000b, 0x4) [ 145.547822][T12645] FAT-fs (loop5): Directory bread(block 6) failed [ 145.584451][T12654] loop4: detected capacity change from 0 to 1024 [ 145.599839][ T22] audit: type=1326 audit(1634100073.160:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12651 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0bca188a79 code=0x7ffc0000 [ 145.615599][T12654] EXT4-fs (loop4): unsupported descriptor size 0 04:41:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x7df, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x81, @rand_addr=' \x01\x00', 0x100}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000180)=0x7, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/40, 0x28}}], 0x1, 0x2040, 0x0) 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c6060100", 0x1e, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 145.655466][T12671] loop5: detected capacity change from 0 to 6 [ 145.665766][ T22] audit: type=1326 audit(1634100073.160:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12651 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0bca13b994 code=0x7ffc0000 [ 145.697238][T12671] FAT-fs (loop5): Directory bread(block 6) failed [ 145.759488][T12686] loop4: detected capacity change from 0 to 1024 [ 145.779533][T12686] EXT4-fs (loop4): unsupported descriptor size 0 [ 145.805855][ T22] audit: type=1326 audit(1634100073.160:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12651 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0bca13b994 code=0x7ffc0000 [ 145.831553][ T22] audit: type=1326 audit(1634100073.160:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12651 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0bca188a79 code=0x7ffc0000 [ 145.857006][ T22] audit: type=1326 audit(1634100073.160:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12651 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f0bca188a79 code=0x7ffc0000 [ 145.928233][ T22] audit: type=1326 audit(1634100073.160:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12651 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0bca188a79 code=0x7ffc0000 [ 145.952817][ T22] audit: type=1326 audit(1634100073.160:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12651 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f0bca188a79 code=0x7ffc0000 04:41:13 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x21f6, 0x7780, 0x6, &(0x7f0000000140)={[0x3]}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="100008005822875340eb4c0bce472b13c560cda37ddf3b3aef24b979b8c1a9045cbb3d2241c2893be152f5c30a7324dae0076b5a88b072ed8b368fbb894bf2b5584fd3066b5ac289be09", @ANYRES16=0x0, @ANYBLOB="000000000000000000001000000015000300", @ANYRES32=0x0], 0x28}}, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r3, 0x1c8}], 0x1, &(0x7f00000000c0)={r4, r5+60000000}, 0x0, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000180), 0xfff, 0x200) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f00000001c0)={0x16, 0x3, 0x0, "88ad208c04c0a31477b93cf149f382ee9705b2dc96db"}) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000300)) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r7, &(0x7f0000000140)=""/62, 0x3e, 0x76) io_submit(0x0, 0x6, &(0x7f0000002980)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x40, 0xffffffffffffffff, &(0x7f0000000440)="8be817d01c5a4bbab9e117c37ab6aa173c97cd569109c7be3a0ebd66cecefb72385792d0336e038ed3bc3764fdac8e5fe6fe40bab1ff62a9cd8a9c86347ad5d8340384e133ba17bc347b8995eddb14aa0740b479b525c78d38bd0de3f5d4b9d0f8a9b073f29f643b104dbd940601de1d09d73d34c4ae43e1337b4e6dd1c9002eb01a65ce75ae8d818c62c3a02eed3155dbe0fe9d45607f165fb4839e2cc4ffede7c0a463b3005fa02a9c7f19dccadf3c04f4da50bfd00226878ce730dd513b283d8cc958abe152297cbd90cbc6d23669cbbe3cd333705e811352bffef26cd2f7abb8615e997bc816373d255d22bd12430563e178a3e7", 0xf6, 0xffff, 0x0, 0x3}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x8, 0x800, 0xffffffffffffffff, &(0x7f00000005c0)="d119ef4acfdb128371f39c26f2362364984f56475ba33bcd08d51563d6730c185b31c43fae0583eb25f8cb0c36baf1b33068437298632210cb131fec443cffae9e21c6ba83d358f2e50150c7eee3b7ca24eed807f06df7f161e0de9590a19f875f222149f315b1bb448434bea14b9d326574e9e914d4b59f31c14cfe2f0df2745e079b099b0de5867e1eefc6ab0f2ab9aaae9d40cfb3e62e16270209543b7366b964a66d97ccdbd4e861f21648be13d6bc7fc18807024a2ff724afd21530b593e3457dc32b6aad097d458ca45aec05e4ad9391560bd448fd4f52581bf16e718d98393c5e6d6ce04c8cf9748a0d6b0cee0a3160ccfaa446faec7145a32fde755967151a7cc48c3f5d65d4bb389c8520ba59372ab4aaa2adf4810ebf465301ecee596b11a76a653ab54a5b176ca7cdfef4302b4e1e8a69be6403e97282b74df6898186f94c39569e31cd31e1ede8b77457406f5535be11a715294afffd564dc9b50adea0d7699a3b818de814596b69d6a20c4155dc60af492d45d9710fd24c53dee6df2a0eb0a10c72ad14b621b800059b25d2f93a6ed61d32431225f1a5c81902f7de734c84b0e7627d83f8cb0983ec8ecb87d954fa18593e988890e0479e9af3d559c521071d61feb3955173d20218753847f97e22cc944a889622568496f1fabefe526259315cd4e47f30a9571aacfe57f0e51db196e89edc57bf46c17637cb2bdd65d12b7cb899b9eb63b175268a2ebbc6ae9544dac37c83c2f7784adf8a849cd1da12ec72d03ec206317406f3e2c82ffa5a5f1bc2d1a1554f0302358a831bdd70f5905eded15e4c73f08637ccfb100111f68c1b1802952e9eba684c032246702fb92510d1941809c570f1337ab161056126fb7ba5674357a34bebcc778231d3d08004e2e49b6f2510e6a7cac40084462a51c271d3b2d786cc01fb5db8aea3bdeb8c7c0ec6c9033494da14d45c933df1cfe664b97ca248425c19896da80a4bb1edd1cd69acd39dc2cc46322ce5d00067be42d9f5bcbd93bfff948180c476767dd350958c08521369775dce66af509ba95c3f2116406072fce78884e4ca816662fd5e7cea8c6bd000cf6d0705d44df44aec656cd375abafbd68be79e12bba6e733989da00f2e341c20f67516550c338172e28e5e6346f1f911a2122e278817b016b58c7ccfc0e5d9ac9da116e41798d4c3d3cf034a4d8bed091161f65ac2662251b8dba185a756769ead657ee6cbd7b7d9be463c7bdc51627c80cc4f31f680bcd17089161b55ab29f6e0ff3b8cb6cb25c22ef0b6da1489e5897929df5c14e810a3f768b180f04800968baeab2d210ef1212214b8eb5dbf34d339231619e129e1b91a750fef5fe303057b584f3434a178d07ca317cb2d9187633dc197f7fc3b7df91ccf37b022f6aa775204c81855f9c48770ebe6ca93a96268e6902977fb2477a1ca8c4d2fda3ddf5f5b39207d1594dee3c51599443cb035990afb5a5a0c7224d100d6d8a35735e450fdc907bf9a0f2b56db8aca6943d6cd7e466ece8564b82366a9082174209549fc1c4783d8f76d86be689095eb49aeab55a109b87a50da46bb20e686cec3d91aa34428c46f0dae229d4b1d295dcd7f82a6063213778f15a4d57aed0d698fc881c583c13b8d6e89705277724533256b002a270447d3ce64a2352b24de93f009511481eca69f0d14f9201cc92a31aa5331ec4d106edd418801fcc37311c23cee5b9be25c5ab13ff18ff428d22f5663855d37c4382fc75741ee80d0cad161722fe295cdba6de7f0309e131533ec62dd9b636a9707d0530291d88d4f31c8535ad6f2b00a23d5f2abda317618162407446e6390e7f203b121d0a3abf09bb0568e08dd0a0c3db9a75a02fe090e9032947c8325dd9905d54f26f1ec6060244b4f9a7a6e434b3cc9c38f2f4de758ba7c377b5053b2846a943bef5d8d6c9627396c9859bb92361166fd5995790d01fe2dd179cfbfa68ad24b7015e4e1bb2aeb1c5791e990791b2c872fbb10888753d950546b88ea33e7a1f8b3951e9035eef43216190f17adcb4de86f6ca33886042e7f2c2fed026286884779052f76b20bce5ec18820f1df51bbf73ab50951c0330ffefe239f5aec68318e5131fcd2f08d3efd75018d8c3e36ffb4e6928d040d7197a4e5fb67a95bcfad0682c000e4958bc6c4ecbaee21ef193234f151f3c2fa92082d26129fba3bd3204db71c9d934beb180573ea4773def9272638629aa1105f1856ede8057c1acb9425b5e2d80c0ad83650559b270a87d2611e3b48eb895d5c56eeeef90cd354d374a4c4e806d1186395da46655aafbeeba4d7a9d0be4142823f7b661cddf2b69d807b637f7e7689e3da9175175e10ad6f9281d58f414bcd45f544602e5f57d6d7e9b1fbd7de77219f854d80f9a575067b6b8af0111bdd08c674df8bc4c454b8a783b84939a35e697c8afd33053a90469b4af7452727bcc1df251c2c311ac708016523864069eedcad30697ec6a564debd93befcdab24f5a72d26212e011b7a3428ed3835b34b22f32503b94ff4c8c2b48664c0397c930f15ea5f87f4fecca7eff781f868963e0867db3ca5a046e2bac883dd18db8ac81bc2e0a7e6909478f480718ee8d8a512b81db2079d90dcaab39d5398c15e670eb114ec4a92de0fe91a19fb2c410cd1168d89f24ba49c5ebbced88a97750af197ce92e87ad2eb4c8fb87a0ff65f97a746a31ee3285f97ef9d7fee44737d5766d87751a167f1e084d3bb9b334d1a8d76ba1bbe18144eeda8c92a313a1ad412b25b5dfec0bbcc8d15d5809610fa76a5dae8873300fd177d570668aca1e8111eeb2b060579a6c6702c4e11b18d6bb0d2a18e2e7aceb7cae05c183e2249894de96d8e142a5fd84c4f7a0d94c80a647440b7ae82e4ea4e88b21f7bf82e13afe402683cac65da18c5b81f1af02b38fef41331e7b3ccfbd77809031cc1c2ae6b2d49fdb2413867cb1edf96f4a83de169f037a9bad1eeb1b8f7ff68585c647cc0f710a8e5e9d1970166540a7266ae6dbbc4c16db1666e803a1540c12edaae3c4b41614801c0ad0bc4accd97027900dd66093ee326557f133fb977628a7e4bec737c8842b94c95a45106e0eeb14a39319fd1aad72786fbb6a6c1a4512c51e2ad1702a9450b90e12c0703debbde17627b8768547fc3e1975c6521223710c43be38b978289ef10aa2ab65fe55d836f41b4571f080553c944af91f73c5237240adaabc3a4e75d628dcf15bab0d5da86bcbd6847cad1dfa80c7f37e8e7a7ca754b80ba6686fd873bea32e20ad4f86a06706a97427f374fd37414ae4919612483a4daac50668ffd04a61dbd9b89b6739dd815e7cf33e7eb7d153ffeb78835e3df8178d1369c5c9e61fe15d3e6f91be38c8451b4f5ab5ccbd90fd451505a1ccd26ed122ef540557dc651cd072e140d691dd22f34b3d79f51699be9b065f3af51cbfcdef5429307fee83626facf4df0570af0d9d44b219afad7fe9c41e1e38ba24e9dd1f2fe39b8893b72454985d18d6b454c0eef23d4c0d294822cd1a3629a8ab6a2f9f19159ec4d56c9112e516eb1f08ad43142223fc92d0ef3d28a4e4e82dc72b3b531ae86e17da56baba1727b100dd25858f5383a5f021b7ba21d03637a000cc0d7917af9252ede69c84cc5fdbd27618545f760416e84ba3be74a6061da6117a7587cb62eaa3e544d1bdb1e756773d611108b7ff1f4bd78d35ee89df7a2f596e66263d03dc2fb15ddee8c4e3296caabeae6ed11ee4bde834b4c9d8505741312a03335b75de70831b327990a6f750cf85eeb064127280849c22846113231cf2bcc3d5d7db18ae18ad0660790fbe8578fad66cf2ceb4dd8ed99ee1efa37a54cbb87b0d1e4f40784cc6fff0395eb55f150bb5996b46bea1ff7bcad5b8a47ff671982984f506cd68080a047d89e3b64148b9409022f747f42cd6909caa6b4f82f3b7647adcb64f915c2b244d86a3cffcd16a35386db86ad68795c126d45c3a861ef7f6f5b9e7e45efe34882a5fcbf41916287473fe6fabc07c53acee96efc0d82624411dd7ae9317e2fe4f2472fbde44aa2cbff7885bc82738204de121770ac8b7eb0bcd32f664e574b47e8189873d228b2544fa92da21c6a089415d673f6fd0b152ca54d730f7586c9b62d57727e707b837c3876b4efadba7d456170b36b94f8b0d30b3c6dd0242dae667fc3cfc7a5cea741b40d90659c08f7c9cf1e90c6dec7d9077e9c6b8889aed6026dd517151a32d10c3ca57c41bfe093a0c1505db2b97cdf63e94ed709e9b171c5c3dc6f98b01d3949b74c27f0be3f1b6950accc4d8c2f116a894b9536736878f463d818960b0320154b92cf665fd1145ef426bbf6df4d6ae89552c09410e9dbbfa6973fd22eedaefe6e932f5e51da720f1926089749f8335b78d999d24812d0d7691f581fec97569487341d43173f72016f4095b29a56fe57fcaeff663a28df2da6508e287e7fe4d6a6f50e8f696ad2ed65ec7b1273dfe989e6caa253d0fbd4d0e1dad3311e5e915b23058fe2942fc2b1008db84ddf8722dcf8eea55f2d020898217fe61ade6a0ac05e8a2e618e9d000c4f1dbb72bc3bb509a4854a5360b2e6e5561e5027908ab2c0f58f8bb6670dfa23a0f3db8c282dd30542f3036449f193bb3acbc0d3beb1dacb692b75ff1232739a0cd40ea067dcea76a735feb2d148108271e1a8b4a51bdc7739b537e30f600267135d10bee3c68ad1e63086d6eb2b4114628a1111e73009c47e4abdaab408a5881a30df3e3a4870474ebf0006ded17ab9e8b8616dabd58c3c5ea84d1915167cdaa20fd4504f280e9d4153991759d9f1b6dada7d947fb0fa51ded834adceb384f19beb1436896eff54324473547e4db3559362abbda3d66631c9ccc45e5b9635a2ba4fd7e0b381a2a2399defc061c314b5f8304b9d97825221557daa28d3af06e7aa39f093a55c1bc6948df17db9dae5e925e7908e9a6e8f05b2d12767be6847fbbcca144d33a5b6580e699e003d30c3277a12714b07aca90b7cf7e2b11fc636f52ced3754cb6f85e607d6fb9a2cc099f35ddc9cb46f0e1d9e83389a9abbc811dfa002a7877c7f235b14a43ec092e5636f3d2a722bf1b4d2c777637146b77fcc0264bf3ccb8dc793f2125653a65c25cd69658ac9905c7392279376afbe45fa3bcb66b405ee9dbc3f1588f4dec1818d0adfb2bba6df546f3e593011baf8e86e38e5dc96d05ce2ea998fa39e6c4596a9732b89dabe4324386c6ee762a3c52ef15dcd7b9cf9f5b5d732df0a629f0d712b6e9fc2126ec47809152ad756e106ffd3c483f58de2e5f495da4fd054e4e450b2ddac3839616e128a33c1bba31d5be78bc84bd5a0f9046d83f875cf5525f762923828d68ffb33abc401da5d9d4b322f00e2c4b5335f50d32a88a2f921560fb3275e5775120716bfd630e37035388a372dcde810194e59ef2418c123ce8bfa4da1ae68fef12937122f4019ea9f5ba6ce8c09036218b79b58c4b915ba7ac7ba374b3a07ce2492fa7d6892fc1e885566d9cfbfd93d742b306c46ea395c91288006567dacad0f69ab0a7a3378cbbfd7ee2183f51d3dc37989a5df40248ab6e8a5232a829a6feea7b88cebae18da6149204d3c328d5c6819f88b947fba2de7688296a9ab4685dc09a4ca42149088577bb423ed0510af9662bdec86a7577d706e3be0f18a9f5d73226196eee7b8270402b398d5a378984c6feadc11de65062ff79ca89ae05cad815d9ddad4b4c14294b3808e9835f277ad70aeb44e673a784d5dadf644b5daf400d1f7d3264cdd20a44929beb9", 0x1000, 0x1, 0x0, 0x1}, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000001640)="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", 0x1000, 0x401, 0x0, 0x1, r1}, &(0x7f0000002740)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000002680)="513e646b9f17600214a0725e2efa6eda1ed009f33d5b864cd2478bcd5e6e6a2333c432e50645d380e0df8e7e9bd4b77b19fe74dd681e20fa9edd25522ab9e5b0555840d03528ffcc541b79c1cdf38a5bfbc1bc2eed53241b96e4c44889b0d6079e4ae03c00e1f82517dfe54bba49b1b914ceab1110c370c5bb3d8074e98381f0a3da874c396a69a957cad41f01fec2c27b", 0x91, 0x4, 0x0, 0x2, r0}, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x3, 0x80, r3, &(0x7f0000002780)="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", 0xfb, 0x3, 0x0, 0x3, r1}, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x6, 0x7, 0xffffffffffffffff, &(0x7f00000028c0)="5c7ea6f55398f7e45d7233c8aa4889eb0b68a92999866e123bd56ee842edf1f75878386e49550ac0bc0e226382aefbb4adddc72e5346de962096e007a4e410094c785b8f569b586e2d3d38f24124b85b7599d5dd92189cbc250938", 0x5b, 0x4, 0x0, 0x0, r7}]) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x80000001) 04:41:13 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3a9, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = getpid() sched_setaffinity(r3, 0x8, &(0x7f0000000500)=0x9) syz_open_procfs(r3, &(0x7f0000000000)='net/rpc\x00') pkey_mprotect(&(0x7f0000000000/0x10000)=nil, 0x10000, 0x0, 0xffffffffffffffff) sendfile(r2, r1, 0x0, 0x100003800) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffb000/0x3000)=nil) 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c6060100", 0x1e, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:13 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000340)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() r2 = socket$inet6(0xa, 0x1, 0x80000001) ioctl$FIOCLEX(r2, 0x5451) rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x70, 0x0, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000100}, 0x24084801) 04:41:13 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="00800000000000004e0000", @ANYRESDEC], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) clone(0x28004000, &(0x7f0000000000)="0240a5669415389cf4070d01db0537c2dc32c45209c17078a522ef3287f9380d3d41cba7b17f87b8f610b2a02afa3419535633fd634fbffaf1e3593615b631e4328ec9d3b933add42a50fb6bb6f8f6e4543439e2a46cc502a2dee353accfc2151088bdc80921ed256c9b9c9ce3c72f0c7e7643ae23cbdb", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000003c0)="9dd62c1aade99519c931d9a63059b6c1e046f4e3041552e965eedf1d815ae42c0d635b38e3207a5f8919f112ca0e186527be4d48a938f6678ecc54b13f1a9bbcf10ccb1d2bc978c0a196134f830715dd630c13990351f46ef378504ef7a55f1981f5860961dcd60961218c7ecb14c86da9cf0a6bd604f14e3b354eb194b544092b865b81c49ddd763db8377cb2af3d719d15f019455850a8771a64eed9e9ee6e57f48bb47e61bafc281b8b2f489de5b33932c95e2f07303c2d681999b7b7b8f312d0ea63ed8d305228e0755d57836de6e98305e168bd6e803619f7d60529fafe988e28b7e849b7c23bd0dd865b9d73c55892c0884ca14649400bc488ee7f369851ca50b22157c23471acb60a5205ce504301c20eda76c3068e23d4cb7aaa255483c792901e735a2852f08753293b288f8441f5acf24253eead3565d67e64b43ca249f44c10cfb39530a8167e6b99d7384148d38c310447bd73d5c2d9d5e5ebd13fb1057e6258df9ad4d20698585e3175ee017ccac4db11fa416d4a16f11306933895d91fffdfbf60e1d07ef81019df9da0b639ebdb51df183a00edd040965bd4bb3366b0cbe04e880541438458f11731bd47f22622a38bc92170dd4ee43d2ab77032de9a1844949203a0ba8b2a43a4bec98eb7e37187becfa589ac7f9bc368914181fb07210e2402966fb5ecde132bd603cf5105eaac9cc084ab4983a84bd0fabe91a0feca1848f7c8c7c4ba99a11f609386e3a3095455268331a7a7eeac3ce30774e6f49da4497c393cf8fe1b7516db4d7aabe6c55855ff9518f32a310c8fd45f47560634af0a5d109b5ad2711b009703d25573c3537dd6610ba626871808740e6e628176c61d11ee4d7bf2338ba6cb1733940a94b4424489b4f088f23c8b3ed949395feb3f3a9a13337f14240a792d5186dd8358f5474e2c3682be12abd5d1a96cd364b5541280ae4d4f70d85574bfe1cecd6901c04f4201568f3a2ab70b992644505302f9adeceaadeea863adabd3877a9eb59f0a93cfc752514f416e4dd044240f7c814efefc88dd065e2ed83506a6319a416072b69b1dfb5d8fd6cd8182ca8f84d067a5a8c4db0fdb91218eff0a2d88f0d005fb557560e1607b72519432307ee9d03139a67d07f98eff2a5b9325660c554fb10c2580953112fe281674ae6a763193307c1b91cf739e4ec7a5d1e8671fcfa3a77bf84a69d5234951a7b45261548576ca8588ef831715f92c55694b76d07d3df839cdac34c318f69d58e02993a9c4b37defdc9535100719c41acc0f80cff62ba13e2ee8d07909fe79d8471c7646d2ed520b8b77f643b4ed57e9e3161a7df80568fc11865671262456c327b370e64d2fc2e05b241508eee7995b2df99aa30f152f14f3ef5a35c3e0bc6a41e369609a9d945f6a759f464a6168200ced867d10ebce606738fc75ad47f58aadf0390de16621affbbcdc607fb581eefe3fcabcb6a674f26eca35b95ec0cf4b466f3c0c230914998d59161a6d8abe170f5ec0e8625b58f0094b07b37829c293ecd4a66214765dd50fbcef4b1df11154ec777ebb7c1c40cc3d9f3c18f7479a98a09079071d9abcf073c1122d8fbdea710847d845f88ecb1fac0c202abe04a5683870c05cc51ae241b606e82dc2336cb3342ea33e90890bd3ee72ae283a392553ef2b56d6d52bdbac9c3e832a4b7b1a7a704aeeccb99541d0e1ec829d693b06605ef2857cff6fcb860d00d3d2645ab0fc8f3fe605f0e1e30525e4d80590e02424990642d402fa556aae0622da4ae8ea3597936947e3f293dbad97ac21045d0d3df2b55a5ae1c53fe0e115854be6859c694a8ebe0677e22770f1fc126b9baa6d8c8725841b0fb89f21df59772361c26d7a1fcdeadbc2c213a86955ac6869aef90be75483d064e3aa57ec92290d12a702f799930641a374e914712cb74cdbf3be93d7b707028ce3c1e99119ae18aa18d699a2cd186ad723961265d3a372a8020e7fa338c6c21529c8719db305ae2ae95f388d9f7c15ac762608c24b37fb2bea4ae0619ea5d5d2c0052664bee54c7702def73c564b257a7da6d4f60513a7749d23ceccd19f7343841bc9bf6503989695916facd5c202baf7a8993342c3ebc801b2912522e8aab86ed0c09a5bf4df1e54fbf03319d53900a43983527e802cd8c3c132520ed93c3536fd1e52a4da600f5c47f0540c3352604ac150663786ac703c49c41cba740c3639c382940604005334059b8622c893313ecd92103a8e3b041e2cae5d892e847856227e1e099bf7cad2cf05f96ed193bb3344118fe808d6540731afe8d3a0e7a7c523e4d04e8c37025ce1bdd3a173bda900d630b3c6d20dd979641c08dfda3b73ecbd236b7cee11fd67191edd6420281d6e19d2bda4667dd8ed7d4c0c3401908c094c35c4b19754ec3d3f3758e05a21f1138c42c5a1d7dc94119a7e87b55d68c0376d19950933a3655f0e2b15a51698020ea4c8d6e090c29c3bfec9e06c31881d9c395e9f1c6f851f34b4e7bfc9617834c441bf3248842f1944a8ea1c89f0ab64db50d5c1d6a9cca8f23e317c40da93d27706df0bd541439c15bda5e2d98932c22bd1cf503909eb072138d80303c065ed1a3ee9666c0b95e177589fa2c9f6cb8d86a87b993314d924ef54c341c7d012770c32d015ca2aa054d70fc1ba53c9b358fb1325271534ee5cf1707b3da6da17cace3615e0e3ba28e170e969e257bd83764821b5892bea33cf46f384e9f3ba9cfe8795267917e458bff77200726035850bc8c50665e6b17924dbe516df1275a505751dbe627bfe7248abd016ee5fe3e604b3fc1d5c74b981f56aaa3d4ca020358c5649d3ec397cdba673deb263db672cc1ca7f417bdb8ebaacfc748c695c82ddff44a4fbaad7179b7069141685659f343939eba57e1795fb32f83be44067af6b280ab047dbd57e1e6acbc10a031cb41d18ed41c6450f6dd8d92d85697ba5dc43296ac505111424d2ecbab25efbecae79d3bedad9445b4c2ae9dd688bb97802f670c609fbfa1a60ed9ce521a6d21b030648752b8574f02b3afc9bc763cdeea629fe1a4c795caec2a52ba6b58d36b2b310518e50cb1be5e30d5ce70b6f8babeaeec243db32f01866ee52fbf5510d177833f32105b42f140eae2a8ffc6c6e44f4f1b84fd955ee6dbd0680568acdea7ffa1d6b2859ee0cefb200cf2a68a3b8621c8ce6dae3afe42e8292fb5986b31c26dc9322497ab44fdb4a7a43bf92bb178404859bdb9d3ce5e25967a7294880c06bed0ee74b7a69ac412c04d8afa16cf7df869047c57cb14656f4290dcd76c39a9ed06fa3962345510e79e37d78f6d7b019b4b62bbcb617a6d5d10914d8f765d6ac2ef9e062c9642181994407a1a172285c65e23d147e0d21c88b666e92c78415aa2366d2c19ccbd2a4e708e0db169ee6acafd57d4e55365ab634c84fb941aa3d56206855d0ea9db36699cac6647eb990f717a12a8f77b738277ac584b486ad38817778746bbf756504f28bdda6bf3718de29ef3f25f11b7f5ab463853950b7bf37f74deccc74016b235b1af7f1d1c873c497c5eba13e3ad1c6179470b8934bfa75e593d507906ddace6251d9efdd70a6d6c2db1ab770f3cc34330a71b5bf041c4c0a0f4e61e20223965b7d428c4028933510f3830509dce4aab474afa8c690ccdac58b4443e3d82500d8e994b80ac363bad45dc6ec69107fcdea1f575b2b5ab318467681abfd31f2358f7d06886460c2588a2d3d855d743b381d0aae1bb826d7c7919e1c28b9fd25b7c4bd5eaa7708ecc4164c71820877a051c251d3a1e519ba9bcac7c3be149a45c88f0ef5d523bc50199a49d31ad5fcb1d839868478c27aa53e70ea5f0569bb12845264a2ec4040263b78e73f7d66ba90c5f18e70ff4d91531be472656bab660baa95b1fe4d9d1ea56560f6673945d1af2ec887c0ad7e087b27d5e8533c6c591fb5d3737b7b281ef6e564a8d6b039818641bdb44dcf40eb881f0ab5fc206ba008dbe35e996d212e49103dc35f28b6d06fe19ddcd4cd592aa88e527b1cddf316cb97ab839f174c7ef2e966ab6628f3c807a793d3421a6c26e9404df6a640a1b9ecc9472ddee91742deb79ee2521ee8e2144b9c37a74e0924cbb0677179b7ee0ab6683df5b94f88af055e58d86499d9005319e0d28ad46d11a7bc33b9e395c85a861a3440cac97896336f51f68379d6ba6f17d2a3e6ed3afa697e127aac9d7ef67e4b1c402725ebebd70a21aeffde128a849deac0f76a7155ea4aa24ba8db48395e77cdd169869d343e02f162c0baa1061d4073e56b40f8db75c5cdb5c652d6f93848f88feb3f660eff92c8ff78caf3a4819a7a5828022961a06d5ed81395269f8578cc9b5b0c0659c9b10f49dbee3cebfbbc3e6998ea25e166415d2a8fd42921f4cbfb94cda596cdef3f533e1d5a17c4dce22c1b3b326347f4d87c3bb3f796ce9669f96cc2208a13fdac1b68ad17346eed1fd3b8e39eee348fe9c6ec4334200b7970c9dfc4e7769d5adca3ea778393d3b56adcec9e7fdf548acbe99d1c4872ff002b02748b9498d1cb7b19faa54ca5472771398c9bf5232bae7ae6d3a180abc8f0ff95d82b4a4dfc52f4ac50000a11ba2f9b55ca5ce04cc2b368a93dd6b8db3742495b496b6e735d19009613cdb153e98a21c9a0734fa058cf08cab421d554e7cfac4e69ba8ffc48f40f0fa1cf9c4e87d171ce7c07aeb90b4d6f7d2805e1860629d4ff1d4468434f9c18559d567a50b66477073d9aa89d5a75ae2474b486544896906e3db63509ca47c737c563d5a5d84fbc52bc414cae11f4c427a67b89b43779b055a8976450592c598053eced781c0f531e463c030b12320761178919b73c49d07d6d2605cd3744cdac2614f90590ec164c9dac1d121e2bad58bfc76a995e6a61ee7b04eafed23ef07750c5101079a793fe458ff7bb81111971c03a470592106e9e1876b33802e24c5c38f18963bf148c363c26356f19acba662507ee15c7236c900e1ae48f52210b410dd6b0b92e51231be51ed87f1a1a4dba7aa8950bda03bf61936aebe5d3c721fe4d2df790c4fea1503456f48966c70789bc3e4e93ccd2edb2f6a2f29990166e1d7c06176c0aa41494f688b5bd2d993e63fd799fb3ae2e324971c437dcdc5c6610e42e568d72880975d97dae117e90157cfe1739cedd21484b3dfba85aada3bdc4a0716f2e35d1f4087daac1c5f1c78a3294e8128dfe95dcee7953435dd5c441513c05c505b2f9873915574be73378a2f73bfa3d1bf95be8ab1a4342eb025e7feb7519df2f7541967c29ae6732f3aaba2c2b475cdea6e2a100c1661a0ab82d2d821fd86fb5f3b1e42782b764e7c8eba9389f6d1295dd30de6bfa249dd2caf64fa4dda89bc1ca32ff592f8ef9391a1d0aa95d5548b0ba595498a679b6aa4b96344760c64edd324b3d4bfd898e16944daef4a0ced8c080c393797c7fa4f1dc5a735789c64f09c36727b80ed6eeb54cf9bfacf435e24fae53ff5d0064fc13d72e305131aecd893ed0f7d3bcc16490abe4261a31ba833e5c1fd6722f687af7058d9fb64c9b66c19f4ff0c453ecb5b4a81c21e5ca81f7755709d0124ce5ed11610a1c28880e39c9f1759d198921f19dd283e8b506c35a0d9b4368c4f04b61162efab0685b109f166bb6aea4ed66f153e0c7862666ffcd16a925963f148effc15e4c2b0d1819bf79eefa00e83cc5722c3dc08f440b3990acfec42f514d88849c2c9598cf4d9872a382f47d7c181836bcfd774e0f6c4741fa2c2b207b5d198dcc780a955b6e6e65c1584d5899279e3537bc6507") tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:13 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3aa, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 146.191415][T12704] loop5: detected capacity change from 0 to 6 [ 146.206805][T12704] FAT-fs (loop5): Directory bread(block 6) failed [ 146.223121][T12713] loop4: detected capacity change from 0 to 1024 [ 146.243464][T12713] EXT4-fs (loop4): unsupported descriptor size 0 [ 146.251459][ C0] sd 0:0:1:0: tag#7392 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 146.261313][ C0] sd 0:0:1:0: tag#7392 CDB: opcode=0xe5 (vendor) [ 146.267642][ C0] sd 0:0:1:0: tag#7392 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 146.276679][ C0] sd 0:0:1:0: tag#7392 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 146.285714][ C0] sd 0:0:1:0: tag#7392 CDB[20]: ba [ 146.314600][T12733] loop5: detected capacity change from 0 to 6 [ 146.329933][T12733] FAT-fs (loop5): Directory bread(block 6) failed 04:41:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) 04:41:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c6060100", 0x1e, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:14 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000000000000000010"], 0xe8}}, 0x0) clone(0x80101900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) wait4(r0, &(0x7f0000000000), 0x8, &(0x7f00000003c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r1 = getpgid(r0) tkill(r1, 0x3e) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) 04:41:14 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3ab, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) [ 146.488360][T12755] loop5: detected capacity change from 0 to 6 [ 146.504567][T12755] FAT-fs (loop5): Directory bread(block 6) failed [ 146.508960][T12759] loop4: detected capacity change from 0 to 1024 [ 146.587673][T12759] EXT4-fs (loop4): unsupported descriptor size 0 04:41:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) 04:41:14 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3ac, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:14 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\x00'/11], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:14 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0xf2b08500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) rt_sigqueueinfo(r2, 0x1a, &(0x7f0000000140)={0x12, 0x9, 0x80}) rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 146.982506][T12789] loop5: detected capacity change from 0 to 6 [ 146.990191][T12790] loop4: detected capacity change from 0 to 1024 [ 147.002394][T12789] FAT-fs (loop5): Directory bread(block 6) failed [ 147.020521][T12790] EXT4-fs (loop4): unsupported descriptor size 0 04:41:14 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3ad, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 147.109173][T12828] loop5: detected capacity change from 0 to 6 [ 147.117329][T12828] FAT-fs (loop5): Directory bread(block 6) failed [ 147.121335][T12830] loop4: detected capacity change from 0 to 1024 [ 147.144437][T12830] EXT4-fs (loop4): unsupported descriptor size 0 04:41:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) 04:41:14 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x8000) syz_genetlink_get_family_id$fou(&(0x7f0000000000), 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) wait4(r0, 0x0, 0x1000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') rt_sigqueueinfo(r0, 0xb, &(0x7f00000014c0)={0x3b, 0x4, 0x4}) pread64(r1, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000240)={0x0, 0xfffffffffffffffc, 0x45, 0x0, @buffer={0x0, 0xdc, &(0x7f00000003c0)=""/220}, &(0x7f0000000140)="9fce42f52821a34dab7aee3f43f2e7def386dfc428fae4dbed1e02dfe7a5e06dc01fd805d657b0c5c1d9c24b8f5c45639b12ca65f4b2225d5314c8fc0359edf2f50060a443", &(0x7f00000004c0)=""/4096, 0x80, 0x10000, 0x0, &(0x7f0000000040)}) r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) 04:41:14 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3ae, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) [ 147.364873][T12852] loop5: detected capacity change from 0 to 6 [ 147.369157][T12848] loop4: detected capacity change from 0 to 1024 [ 147.383846][T12848] EXT4-fs (loop4): unsupported descriptor size 0 [ 147.398605][T12852] FAT-fs (loop5): Directory bread(block 6) failed 04:41:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:15 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) 04:41:15 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x30000000, &(0x7f0000000000)="d2e3e7c73bb0f3450f381b8fa4033c64b614411c1d5eef45f7cfa7518e15fd81cd50ca934d6c0d9e", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000240)="90338c449ff4d2abe5abd87ee6045c99db6bb0749bbd464c117f931f1ca33cdead5d4a8aa8ca106eacb2eef7426f1f642bb5551eed29a8a1073d6a82f7f3e86b0dde1aa5f1bc9f54c4e410d2d5dce97f469c6f1fef") r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000340)="00000005330695285fc4ef4d34", 0xd}, {&(0x7f0000000380)="e3e47158af3a88b7d752ee9a51d1093652e7", 0x12}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getpgrp(r0) r1 = gettid() tkill(r1, 0x7) r2 = getpid() wait4(r2, 0x0, 0x2, &(0x7f00000003c0)) r3 = gettid() rt_sigqueueinfo(r3, 0xa, &(0x7f00000002c0)) ptrace$setopts(0x4206, r1, 0x7, 0x0) wait4(r1, &(0x7f0000000100), 0x2, &(0x7f0000000480)) 04:41:15 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x402, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:15 executing program 1: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000500)=0x9) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYRES16=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0x2, r1, 0x7, &(0x7f0000000240)) r2 = gettid() process_vm_readv(r2, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/232, 0xe8}, {&(0x7f00000014c0)=""/207, 0xcf}, {&(0x7f00000015c0)=""/129, 0x81}, {&(0x7f0000000000)=""/23, 0x17}, {&(0x7f0000001680)=""/151, 0x97}], 0x6, &(0x7f0000000040)=[{&(0x7f0000001740)=""/136, 0x88}, {&(0x7f000001a880)=""/232, 0xe8}], 0x2, 0x0) rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) [ 147.849901][T12892] loop5: detected capacity change from 0 to 6 [ 147.861420][T12896] loop4: detected capacity change from 0 to 1024 04:41:15 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x406, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 147.891185][T12892] FAT-fs (loop5): Directory bread(block 6) failed [ 147.907708][T12896] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:41:15 executing program 1: semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000003c0)=""/229) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80940900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 147.985780][T12933] loop5: detected capacity change from 0 to 6 [ 147.998956][T12933] FAT-fs (loop5): Directory bread(block 6) failed 04:41:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) 04:41:15 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="0800001973e15001e9bd4b0000000000000000"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 04:41:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:15 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x500, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) 04:41:15 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 148.232761][T12954] loop5: detected capacity change from 0 to 6 [ 148.243658][T12953] loop4: detected capacity change from 0 to 1024 [ 148.253548][T12954] FAT-fs (loop5): Directory bread(block 6) failed [ 148.260850][T12953] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:41:16 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x600, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r3, &(0x7f0000000480)=0x52d7, 0x9) 04:41:16 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000000)={0x29, 0x5f, 0x7}) 04:41:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 148.729370][T12996] loop5: detected capacity change from 0 to 6 [ 148.735790][ T22] kauditd_printk_skb: 251 callbacks suppressed [ 148.735802][ T22] audit: type=1326 audit(1634100076.300:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 148.763610][T12998] loop4: detected capacity change from 0 to 1024 [ 148.769818][ T22] audit: type=1326 audit(1634100076.300:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1559deb994 code=0x7ffc0000 [ 148.798961][T12998] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 148.800359][ T22] audit: type=1326 audit(1634100076.300:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1559deb994 code=0x7ffc0000 04:41:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:16 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, &(0x7f0000000000), 0x20000000, &(0x7f00000003c0)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 148.806939][T12996] FAT-fs (loop5): Directory bread(block 6) failed [ 148.830280][ T22] audit: type=1326 audit(1634100076.300:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 148.861542][ T22] audit: type=1326 audit(1634100076.300:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 148.899291][ T22] audit: type=1326 audit(1634100076.300:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 148.926427][T13019] loop4: detected capacity change from 0 to 1024 [ 148.932684][ T22] audit: type=1326 audit(1634100076.300:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 148.958563][ T22] audit: type=1326 audit(1634100076.300:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 148.970497][T13019] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 148.984060][ T22] audit: type=1326 audit(1634100076.310:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 04:41:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) 04:41:16 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x604, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:16 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\a\x00.'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000880) 04:41:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 149.014829][ T22] audit: type=1326 audit(1634100076.310:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12997 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 04:41:16 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="0831b8e97b819aed48a011418dcf5b37ecb61b2973674ce3d2501a97bb4402959387dc6c601ad08020e75dc6ebaa98d47247b2ea5a6d1e510dc114ae10437e39b1c0ee61ef50981729e40d5dfb3dda895fba697401a472b21296287c54eb9cc4b1a78faa7b116325a1d49bad3b09fe4a473254afd92e36a30000eaffffff00"/140], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xd, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) wait4(r2, 0x0, 0x8, &(0x7f00000003c0)) 04:41:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) [ 149.114508][T13046] loop5: detected capacity change from 0 to 6 [ 149.119714][T13044] loop4: detected capacity change from 0 to 1024 [ 149.132651][T13046] FAT-fs (loop5): Directory bread(block 6) failed [ 149.153889][T13044] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:41:16 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x700, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 149.255752][T13084] loop5: detected capacity change from 0 to 6 [ 149.270604][T13084] FAT-fs (loop5): Directory bread(block 6) failed 04:41:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) 04:41:17 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="051dab3d00000000000000"], 0xe8}}, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x34, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7f, 0x7f}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008055}, 0x20000800) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0x24) preadv(0xffffffffffffffff, &(0x7f000001c940)=[{&(0x7f0000000700)=""/186, 0xba}, {&(0x7f00000007c0)=""/48, 0x30}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/98, 0x62}, {&(0x7f000001a880)=""/4096, 0x1000}, {&(0x7f000001b880)=""/4096, 0x1000}, {&(0x7f000001c880)=""/42, 0x2a}, {&(0x7f000001c8c0)=""/116, 0x74}], 0x8, 0xfffffffa, 0x7) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) process_vm_readv(r3, &(0x7f0000000040)=[{&(0x7f0000000140)=""/82, 0x52}], 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)=""/224, 0xe0}, {&(0x7f00000004c0)=""/143, 0x8f}, {&(0x7f0000000240)=""/13, 0xd}, {&(0x7f0000000580)=""/135, 0x87}], 0x4, 0x0) 04:41:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:17 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x827, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:17 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x21f6, 0x7780, 0x6, &(0x7f0000000140)={[0x3]}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="100008005822875340eb4c0bce472b13c560cda37ddf3b3aef24b979b8c1a9045cbb3d2241c2893be152f5c30a7324dae0076b5a88b072ed8b368fbb894bf2b5584fd3066b5ac289be09", @ANYRES16=0x0, @ANYBLOB="000000000000000000001000000015000300", @ANYRES32=0x0], 0x28}}, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r3, 0x1c8}], 0x1, &(0x7f00000000c0)={r4, r5+60000000}, 0x0, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000180), 0xfff, 0x200) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f00000001c0)={0x16, 0x3, 0x0, "88ad208c04c0a31477b93cf149f382ee9705b2dc96db"}) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000300)) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r7, &(0x7f0000000140)=""/62, 0x3e, 0x76) io_submit(0x0, 0x6, &(0x7f0000002980)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x40, 0xffffffffffffffff, &(0x7f0000000440)="8be817d01c5a4bbab9e117c37ab6aa173c97cd569109c7be3a0ebd66cecefb72385792d0336e038ed3bc3764fdac8e5fe6fe40bab1ff62a9cd8a9c86347ad5d8340384e133ba17bc347b8995eddb14aa0740b479b525c78d38bd0de3f5d4b9d0f8a9b073f29f643b104dbd940601de1d09d73d34c4ae43e1337b4e6dd1c9002eb01a65ce75ae8d818c62c3a02eed3155dbe0fe9d45607f165fb4839e2cc4ffede7c0a463b3005fa02a9c7f19dccadf3c04f4da50bfd00226878ce730dd513b283d8cc958abe152297cbd90cbc6d23669cbbe3cd333705e811352bffef26cd2f7abb8615e997bc816373d255d22bd12430563e178a3e7", 0xf6, 0xffff, 0x0, 0x3}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x8, 0x800, 0xffffffffffffffff, &(0x7f00000005c0)="d119ef4acfdb128371f39c26f2362364984f56475ba33bcd08d51563d6730c185b31c43fae0583eb25f8cb0c36baf1b33068437298632210cb131fec443cffae9e21c6ba83d358f2e50150c7eee3b7ca24eed807f06df7f161e0de9590a19f875f222149f315b1bb448434bea14b9d326574e9e914d4b59f31c14cfe2f0df2745e079b099b0de5867e1eefc6ab0f2ab9aaae9d40cfb3e62e16270209543b7366b964a66d97ccdbd4e861f21648be13d6bc7fc18807024a2ff724afd21530b593e3457dc32b6aad097d458ca45aec05e4ad9391560bd448fd4f52581bf16e718d98393c5e6d6ce04c8cf9748a0d6b0cee0a3160ccfaa446faec7145a32fde755967151a7cc48c3f5d65d4bb389c8520ba59372ab4aaa2adf4810ebf465301ecee596b11a76a653ab54a5b176ca7cdfef4302b4e1e8a69be6403e97282b74df6898186f94c39569e31cd31e1ede8b77457406f5535be11a715294afffd564dc9b50adea0d7699a3b818de814596b69d6a20c4155dc60af492d45d9710fd24c53dee6df2a0eb0a10c72ad14b621b800059b25d2f93a6ed61d32431225f1a5c81902f7de734c84b0e7627d83f8cb0983ec8ecb87d954fa18593e988890e0479e9af3d559c521071d61feb3955173d20218753847f97e22cc944a889622568496f1fabefe526259315cd4e47f30a9571aacfe57f0e51db196e89edc57bf46c17637cb2bdd65d12b7cb899b9eb63b175268a2ebbc6ae9544dac37c83c2f7784adf8a849cd1da12ec72d03ec206317406f3e2c82ffa5a5f1bc2d1a1554f0302358a831bdd70f5905eded15e4c73f08637ccfb100111f68c1b1802952e9eba684c032246702fb92510d1941809c570f1337ab161056126fb7ba5674357a34bebcc778231d3d08004e2e49b6f2510e6a7cac40084462a51c271d3b2d786cc01fb5db8aea3bdeb8c7c0ec6c9033494da14d45c933df1cfe664b97ca248425c19896da80a4bb1edd1cd69acd39dc2cc46322ce5d00067be42d9f5bcbd93bfff948180c476767dd350958c08521369775dce66af509ba95c3f2116406072fce78884e4ca816662fd5e7cea8c6bd000cf6d0705d44df44aec656cd375abafbd68be79e12bba6e733989da00f2e341c20f67516550c338172e28e5e6346f1f911a2122e278817b016b58c7ccfc0e5d9ac9da116e41798d4c3d3cf034a4d8bed091161f65ac2662251b8dba185a756769ead657ee6cbd7b7d9be463c7bdc51627c80cc4f31f680bcd17089161b55ab29f6e0ff3b8cb6cb25c22ef0b6da1489e5897929df5c14e810a3f768b180f04800968baeab2d210ef1212214b8eb5dbf34d339231619e129e1b91a750fef5fe303057b584f3434a178d07ca317cb2d9187633dc197f7fc3b7df91ccf37b022f6aa775204c81855f9c48770ebe6ca93a96268e6902977fb2477a1ca8c4d2fda3ddf5f5b39207d1594dee3c51599443cb035990afb5a5a0c7224d100d6d8a35735e450fdc907bf9a0f2b56db8aca6943d6cd7e466ece8564b82366a9082174209549fc1c4783d8f76d86be689095eb49aeab55a109b87a50da46bb20e686cec3d91aa34428c46f0dae229d4b1d295dcd7f82a6063213778f15a4d57aed0d698fc881c583c13b8d6e89705277724533256b002a270447d3ce64a2352b24de93f009511481eca69f0d14f9201cc92a31aa5331ec4d106edd418801fcc37311c23cee5b9be25c5ab13ff18ff428d22f5663855d37c4382fc75741ee80d0cad161722fe295cdba6de7f0309e131533ec62dd9b636a9707d0530291d88d4f31c8535ad6f2b00a23d5f2abda317618162407446e6390e7f203b121d0a3abf09bb0568e08dd0a0c3db9a75a02fe090e9032947c8325dd9905d54f26f1ec6060244b4f9a7a6e434b3cc9c38f2f4de758ba7c377b5053b2846a943bef5d8d6c9627396c9859bb92361166fd5995790d01fe2dd179cfbfa68ad24b7015e4e1bb2aeb1c5791e990791b2c872fbb10888753d950546b88ea33e7a1f8b3951e9035eef43216190f17adcb4de86f6ca33886042e7f2c2fed026286884779052f76b20bce5ec18820f1df51bbf73ab50951c0330ffefe239f5aec68318e5131fcd2f08d3efd75018d8c3e36ffb4e6928d040d7197a4e5fb67a95bcfad0682c000e4958bc6c4ecbaee21ef193234f151f3c2fa92082d26129fba3bd3204db71c9d934beb180573ea4773def9272638629aa1105f1856ede8057c1acb9425b5e2d80c0ad83650559b270a87d2611e3b48eb895d5c56eeeef90cd354d374a4c4e806d1186395da46655aafbeeba4d7a9d0be4142823f7b661cddf2b69d807b637f7e7689e3da9175175e10ad6f9281d58f414bcd45f544602e5f57d6d7e9b1fbd7de77219f854d80f9a575067b6b8af0111bdd08c674df8bc4c454b8a783b84939a35e697c8afd33053a90469b4af7452727bcc1df251c2c311ac708016523864069eedcad30697ec6a564debd93befcdab24f5a72d26212e011b7a3428ed3835b34b22f32503b94ff4c8c2b48664c0397c930f15ea5f87f4fecca7eff781f868963e0867db3ca5a046e2bac883dd18db8ac81bc2e0a7e6909478f480718ee8d8a512b81db2079d90dcaab39d5398c15e670eb114ec4a92de0fe91a19fb2c410cd1168d89f24ba49c5ebbced88a97750af197ce92e87ad2eb4c8fb87a0ff65f97a746a31ee3285f97ef9d7fee44737d5766d87751a167f1e084d3bb9b334d1a8d76ba1bbe18144eeda8c92a313a1ad412b25b5dfec0bbcc8d15d5809610fa76a5dae8873300fd177d570668aca1e8111eeb2b060579a6c6702c4e11b18d6bb0d2a18e2e7aceb7cae05c183e2249894de96d8e142a5fd84c4f7a0d94c80a647440b7ae82e4ea4e88b21f7bf82e13afe402683cac65da18c5b81f1af02b38fef41331e7b3ccfbd77809031cc1c2ae6b2d49fdb2413867cb1edf96f4a83de169f037a9bad1eeb1b8f7ff68585c647cc0f710a8e5e9d1970166540a7266ae6dbbc4c16db1666e803a1540c12edaae3c4b41614801c0ad0bc4accd97027900dd66093ee326557f133fb977628a7e4bec737c8842b94c95a45106e0eeb14a39319fd1aad72786fbb6a6c1a4512c51e2ad1702a9450b90e12c0703debbde17627b8768547fc3e1975c6521223710c43be38b978289ef10aa2ab65fe55d836f41b4571f080553c944af91f73c5237240adaabc3a4e75d628dcf15bab0d5da86bcbd6847cad1dfa80c7f37e8e7a7ca754b80ba6686fd873bea32e20ad4f86a06706a97427f374fd37414ae4919612483a4daac50668ffd04a61dbd9b89b6739dd815e7cf33e7eb7d153ffeb78835e3df8178d1369c5c9e61fe15d3e6f91be38c8451b4f5ab5ccbd90fd451505a1ccd26ed122ef540557dc651cd072e140d691dd22f34b3d79f51699be9b065f3af51cbfcdef5429307fee83626facf4df0570af0d9d44b219afad7fe9c41e1e38ba24e9dd1f2fe39b8893b72454985d18d6b454c0eef23d4c0d294822cd1a3629a8ab6a2f9f19159ec4d56c9112e516eb1f08ad43142223fc92d0ef3d28a4e4e82dc72b3b531ae86e17da56baba1727b100dd25858f5383a5f021b7ba21d03637a000cc0d7917af9252ede69c84cc5fdbd27618545f760416e84ba3be74a6061da6117a7587cb62eaa3e544d1bdb1e756773d611108b7ff1f4bd78d35ee89df7a2f596e66263d03dc2fb15ddee8c4e3296caabeae6ed11ee4bde834b4c9d8505741312a03335b75de70831b327990a6f750cf85eeb064127280849c22846113231cf2bcc3d5d7db18ae18ad0660790fbe8578fad66cf2ceb4dd8ed99ee1efa37a54cbb87b0d1e4f40784cc6fff0395eb55f150bb5996b46bea1ff7bcad5b8a47ff671982984f506cd68080a047d89e3b64148b9409022f747f42cd6909caa6b4f82f3b7647adcb64f915c2b244d86a3cffcd16a35386db86ad68795c126d45c3a861ef7f6f5b9e7e45efe34882a5fcbf41916287473fe6fabc07c53acee96efc0d82624411dd7ae9317e2fe4f2472fbde44aa2cbff7885bc82738204de121770ac8b7eb0bcd32f664e574b47e8189873d228b2544fa92da21c6a089415d673f6fd0b152ca54d730f7586c9b62d57727e707b837c3876b4efadba7d456170b36b94f8b0d30b3c6dd0242dae667fc3cfc7a5cea741b40d90659c08f7c9cf1e90c6dec7d9077e9c6b8889aed6026dd517151a32d10c3ca57c41bfe093a0c1505db2b97cdf63e94ed709e9b171c5c3dc6f98b01d3949b74c27f0be3f1b6950accc4d8c2f116a894b9536736878f463d818960b0320154b92cf665fd1145ef426bbf6df4d6ae89552c09410e9dbbfa6973fd22eedaefe6e932f5e51da720f1926089749f8335b78d999d24812d0d7691f581fec97569487341d43173f72016f4095b29a56fe57fcaeff663a28df2da6508e287e7fe4d6a6f50e8f696ad2ed65ec7b1273dfe989e6caa253d0fbd4d0e1dad3311e5e915b23058fe2942fc2b1008db84ddf8722dcf8eea55f2d020898217fe61ade6a0ac05e8a2e618e9d000c4f1dbb72bc3bb509a4854a5360b2e6e5561e5027908ab2c0f58f8bb6670dfa23a0f3db8c282dd30542f3036449f193bb3acbc0d3beb1dacb692b75ff1232739a0cd40ea067dcea76a735feb2d148108271e1a8b4a51bdc7739b537e30f600267135d10bee3c68ad1e63086d6eb2b4114628a1111e73009c47e4abdaab408a5881a30df3e3a4870474ebf0006ded17ab9e8b8616dabd58c3c5ea84d1915167cdaa20fd4504f280e9d4153991759d9f1b6dada7d947fb0fa51ded834adceb384f19beb1436896eff54324473547e4db3559362abbda3d66631c9ccc45e5b9635a2ba4fd7e0b381a2a2399defc061c314b5f8304b9d97825221557daa28d3af06e7aa39f093a55c1bc6948df17db9dae5e925e7908e9a6e8f05b2d12767be6847fbbcca144d33a5b6580e699e003d30c3277a12714b07aca90b7cf7e2b11fc636f52ced3754cb6f85e607d6fb9a2cc099f35ddc9cb46f0e1d9e83389a9abbc811dfa002a7877c7f235b14a43ec092e5636f3d2a722bf1b4d2c777637146b77fcc0264bf3ccb8dc793f2125653a65c25cd69658ac9905c7392279376afbe45fa3bcb66b405ee9dbc3f1588f4dec1818d0adfb2bba6df546f3e593011baf8e86e38e5dc96d05ce2ea998fa39e6c4596a9732b89dabe4324386c6ee762a3c52ef15dcd7b9cf9f5b5d732df0a629f0d712b6e9fc2126ec47809152ad756e106ffd3c483f58de2e5f495da4fd054e4e450b2ddac3839616e128a33c1bba31d5be78bc84bd5a0f9046d83f875cf5525f762923828d68ffb33abc401da5d9d4b322f00e2c4b5335f50d32a88a2f921560fb3275e5775120716bfd630e37035388a372dcde810194e59ef2418c123ce8bfa4da1ae68fef12937122f4019ea9f5ba6ce8c09036218b79b58c4b915ba7ac7ba374b3a07ce2492fa7d6892fc1e885566d9cfbfd93d742b306c46ea395c91288006567dacad0f69ab0a7a3378cbbfd7ee2183f51d3dc37989a5df40248ab6e8a5232a829a6feea7b88cebae18da6149204d3c328d5c6819f88b947fba2de7688296a9ab4685dc09a4ca42149088577bb423ed0510af9662bdec86a7577d706e3be0f18a9f5d73226196eee7b8270402b398d5a378984c6feadc11de65062ff79ca89ae05cad815d9ddad4b4c14294b3808e9835f277ad70aeb44e673a784d5dadf644b5daf400d1f7d3264cdd20a44929beb9", 0x1000, 0x1, 0x0, 0x1}, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000001640)="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", 0x1000, 0x401, 0x0, 0x1, r1}, &(0x7f0000002740)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000002680)="513e646b9f17600214a0725e2efa6eda1ed009f33d5b864cd2478bcd5e6e6a2333c432e50645d380e0df8e7e9bd4b77b19fe74dd681e20fa9edd25522ab9e5b0555840d03528ffcc541b79c1cdf38a5bfbc1bc2eed53241b96e4c44889b0d6079e4ae03c00e1f82517dfe54bba49b1b914ceab1110c370c5bb3d8074e98381f0a3da874c396a69a957cad41f01fec2c27b", 0x91, 0x4, 0x0, 0x2, r0}, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x3, 0x80, r3, &(0x7f0000002780)="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", 0xfb, 0x3, 0x0, 0x3, r1}, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x6, 0x7, 0xffffffffffffffff, &(0x7f00000028c0)="5c7ea6f55398f7e45d7233c8aa4889eb0b68a92999866e123bd56ee842edf1f75878386e49550ac0bc0e226382aefbb4adddc72e5346de962096e007a4e410094c785b8f569b586e2d3d38f24124b85b7599d5dd92189cbc250938", 0x5b, 0x4, 0x0, 0x0, r7}]) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x80000001) [ 149.591113][T13101] loop5: detected capacity change from 0 to 6 [ 149.595499][T13105] loop4: detected capacity change from 0 to 1024 [ 149.623206][T13105] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 149.630290][T13101] FAT-fs (loop5): Directory bread(block 6) failed [ 149.664078][ C1] sd 0:0:1:0: tag#7385 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 149.673933][ C1] sd 0:0:1:0: tag#7385 CDB: opcode=0xe5 (vendor) [ 149.680261][ C1] sd 0:0:1:0: tag#7385 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 149.689300][ C1] sd 0:0:1:0: tag#7385 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 149.698335][ C1] sd 0:0:1:0: tag#7385 CDB[20]: ba 04:41:17 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) 04:41:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:17 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x900, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 149.968222][T13130] loop5: detected capacity change from 0 to 6 [ 149.977271][T13136] loop4: detected capacity change from 0 to 1024 [ 149.998433][T13130] FAT-fs (loop5): Directory bread(block 6) failed 04:41:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) 04:41:17 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 150.012544][T13136] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:41:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 150.110289][T13160] loop4: detected capacity change from 0 to 1024 [ 150.119277][T13160] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 150.136415][T13168] loop5: detected capacity change from 0 to 6 [ 150.145874][T13168] FAT-fs (loop5): Directory bread(block 6) failed 04:41:18 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) 04:41:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xb00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) 04:41:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xc00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 150.456442][T13187] loop5: detected capacity change from 0 to 6 [ 150.467614][T13191] loop4: detected capacity change from 0 to 1024 [ 150.490551][T13187] FAT-fs (loop5): Directory bread(block 6) failed [ 150.498676][T13191] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 150.560341][T13214] loop5: detected capacity change from 0 to 6 [ 150.569302][T13214] FAT-fs (loop5): Directory bread(block 6) failed 04:41:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) 04:41:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xd00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:18 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) 04:41:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xe00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 150.851966][T13233] loop4: detected capacity change from 0 to 1024 [ 150.860064][T13233] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 150.866162][T13236] loop5: detected capacity change from 0 to 6 [ 150.879423][T13236] FAT-fs (loop5): Directory bread(block 6) failed 04:41:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xe01, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 150.952705][T13254] loop4: detected capacity change from 0 to 1024 [ 150.956730][T13257] loop5: detected capacity change from 0 to 7 [ 150.968798][T13254] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 151.034763][T13269] loop5: detected capacity change from 0 to 7 04:41:18 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) 04:41:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xf00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) 04:41:18 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1020, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 151.301864][T13288] loop4: detected capacity change from 0 to 1024 [ 151.318119][T13288] EXT4-fs (loop4): invalid first ino: 0 [ 151.340036][T13292] loop5: detected capacity change from 0 to 7 [ 151.418487][T13319] loop5: detected capacity change from 0 to 8 04:41:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:19 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1100, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 151.693863][T13332] loop4: detected capacity change from 0 to 1024 [ 151.702849][T13332] EXT4-fs (loop4): invalid first ino: 0 [ 151.706292][T13333] loop5: detected capacity change from 0 to 8 04:41:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:19 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1200, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 151.814558][T13358] loop5: detected capacity change from 0 to 9 [ 151.827116][T13362] loop4: detected capacity change from 0 to 1024 [ 151.843494][T13362] EXT4-fs (loop4): invalid first ino: 0 [ 151.899505][T13375] loop4: detected capacity change from 0 to 1024 [ 151.915559][T13375] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 04:41:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:19 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1800, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) 04:41:19 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1b00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 152.172099][T13389] loop5: detected capacity change from 0 to 12 [ 152.209692][T13394] loop4: detected capacity change from 0 to 1024 [ 152.238783][T13394] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 152.286339][T13418] loop5: detected capacity change from 0 to 13 04:41:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) 04:41:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1f00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 152.567625][T13437] loop5: detected capacity change from 0 to 15 [ 152.574032][T13435] loop4: detected capacity change from 0 to 1024 [ 152.596188][T13435] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 04:41:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) 04:41:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x2000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x2010, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 152.680179][T13461] loop4: detected capacity change from 0 to 1024 [ 152.693786][T13463] loop5: detected capacity change from 0 to 16 [ 152.711238][T13461] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 152.801051][T13487] loop5: detected capacity change from 0 to 16 04:41:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) 04:41:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x2200, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:20 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) [ 153.053794][T13495] loop4: detected capacity change from 0 to 1024 [ 153.068719][T13495] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 153.085922][T13503] loop5: detected capacity change from 0 to 17 04:41:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x2500, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 153.193151][T13529] loop5: detected capacity change from 0 to 18 04:41:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/232, 0xe8) 04:41:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x26bc, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 153.427762][T13544] loop4: detected capacity change from 0 to 1024 [ 153.429812][T13543] loop5: detected capacity change from 0 to 19 [ 153.453964][T13544] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 04:41:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 04:41:21 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x2708, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/232, 0xe8) 04:41:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 153.551588][T13567] loop4: detected capacity change from 0 to 1024 [ 153.560263][T13568] loop5: detected capacity change from 0 to 19 [ 153.578789][T13567] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 04:41:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:21 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3403, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/232, 0xe8) 04:41:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) 04:41:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 04:41:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 04:41:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:21 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 153.929374][T13594] loop5: detected capacity change from 0 to 26 [ 153.935100][T13597] loop4: detected capacity change from 0 to 1024 [ 153.944769][T13597] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 04:41:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 153.986032][ T22] kauditd_printk_skb: 571 callbacks suppressed [ 153.986044][ T22] audit: type=1326 audit(1634100081.550:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 154.027856][T13615] loop4: detected capacity change from 0 to 1024 [ 154.043587][T13615] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 04:41:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 154.076304][ T22] audit: type=1326 audit(1634100081.550:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1559deb994 code=0x7ffc0000 [ 154.088703][T13636] loop5: detected capacity change from 0 to 31 [ 154.151331][ T22] audit: type=1326 audit(1634100081.550:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1559deb994 code=0x7ffc0000 [ 154.156243][T13652] loop4: detected capacity change from 0 to 1024 [ 154.177044][ T22] audit: type=1326 audit(1634100081.550:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 154.210800][ T22] audit: type=1326 audit(1634100081.550:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 154.243240][T13652] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 04:41:21 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x4000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 154.245635][ T22] audit: type=1326 audit(1634100081.550:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 154.276298][ T22] audit: type=1326 audit(1634100081.550:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 154.304632][ T22] audit: type=1326 audit(1634100081.550:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 154.342390][T13681] loop5: detected capacity change from 0 to 32 [ 154.351349][T13683] loop4: detected capacity change from 0 to 1024 [ 154.357861][ T22] audit: type=1326 audit(1634100081.550:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 154.366442][T13683] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 04:41:22 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x4800, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 154.385105][ T22] audit: type=1326 audit(1634100081.560:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13604 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 04:41:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) [ 154.525800][T13694] loop5: detected capacity change from 0 to 36 04:41:22 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) 04:41:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 04:41:22 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 154.949292][T13717] loop4: detected capacity change from 0 to 1024 [ 154.980176][T13717] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 154.989031][T13730] loop5: detected capacity change from 0 to 38 04:41:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) 04:41:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:22 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x6000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) [ 155.066372][T13749] loop4: detected capacity change from 0 to 1024 [ 155.083757][T13749] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:41:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) 04:41:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 155.122284][T13763] loop5: detected capacity change from 0 to 48 [ 155.182886][T13776] loop4: detected capacity change from 0 to 1024 [ 155.215866][T13776] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:41:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) 04:41:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 04:41:23 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x6800, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:23 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, &(0x7f00000003c0)=ANY=[]) [ 155.797896][T13811] loop5: detected capacity change from 0 to 52 [ 155.818621][T13818] loop4: detected capacity change from 0 to 1024 04:41:23 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) 04:41:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x0, &(0x7f00000003c0)=ANY=[]) [ 155.854127][T13818] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:41:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) 04:41:23 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x7400, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 155.936308][T13848] loop5: detected capacity change from 0 to 54 [ 155.943778][T13856] loop4: detected capacity change from 0 to 1024 [ 155.958727][T13856] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 155.967957][T13856] EXT4-fs (loop4): group descriptors corrupted! [ 156.061604][T13882] loop5: detected capacity change from 0 to 58 04:41:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) 04:41:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) 04:41:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x0, &(0x7f00000003c0)=ANY=[]) 04:41:24 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') 04:41:24 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x7800, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 156.680985][T13903] loop4: detected capacity change from 0 to 1024 [ 156.710698][T13903] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 156.716651][T13916] loop5: detected capacity change from 0 to 60 04:41:24 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:24 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 156.719993][T13903] EXT4-fs (loop4): group descriptors corrupted! 04:41:24 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x0, &(0x7f00000003c0)=ANY=[]) 04:41:24 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 156.819163][T13940] loop4: detected capacity change from 0 to 1024 [ 156.826320][T13941] loop5: detected capacity change from 0 to 61 [ 156.837914][T13940] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 156.847164][T13940] EXT4-fs (loop4): group descriptors corrupted! 04:41:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) 04:41:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 04:41:25 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x8303, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, 0x0) 04:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 157.534117][T13976] loop4: detected capacity change from 0 to 1024 [ 157.541006][T13977] loop5: detected capacity change from 0 to 65 04:41:25 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x8803, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 04:41:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, 0x0) 04:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 157.643413][T13998] loop5: detected capacity change from 0 to 68 [ 157.707963][T14016] loop4: detected capacity change from 0 to 1024 04:41:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) 04:41:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:25 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa303, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c8933d6c606010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed410000000400ec27f465d60df4655fddf4655f000000000200040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000c800002000000010e16cd3d8f500000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x4d5, 0x0) 04:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 157.942052][T14035] loop4: detected capacity change from 0 to 1024 [ 157.955249][T14046] loop5: detected capacity change from 0 to 81 04:41:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:25 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) 04:41:25 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa403, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 158.100403][T14072] loop5: detected capacity change from 0 to 82 04:41:26 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) 04:41:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) 04:41:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:26 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa503, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) [ 158.795699][T14096] loop5: detected capacity change from 0 to 82 04:41:26 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa603, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:26 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 04:41:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 158.912236][T14121] loop5: detected capacity change from 0 to 83 [ 158.994792][ T22] kauditd_printk_skb: 630 callbacks suppressed [ 158.994802][ T22] audit: type=1326 audit(1634100086.560:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14124 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f455b135a79 code=0x7ffc0000 [ 159.032911][ T22] audit: type=1326 audit(1634100086.560:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 159.057737][ T22] audit: type=1326 audit(1634100086.560:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 159.082958][ T22] audit: type=1326 audit(1634100086.570:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 159.108789][ T22] audit: type=1326 audit(1634100086.570:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 159.133624][ T22] audit: type=1326 audit(1634100086.570:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 159.158557][ T22] audit: type=1326 audit(1634100086.600:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14124 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f455b0e8994 code=0x7ffc0000 [ 159.184114][ T22] audit: type=1326 audit(1634100086.600:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14124 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f455b0e8994 code=0x7ffc0000 [ 159.209182][ T22] audit: type=1326 audit(1634100086.600:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14124 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f455b135a79 code=0x7ffc0000 [ 159.234599][ T22] audit: type=1326 audit(1634100086.600:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14124 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f455b135a79 code=0x7ffc0000 04:41:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) 04:41:27 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa703, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) 04:41:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:27 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa803, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 159.685841][T14151] loop5: detected capacity change from 0 to 83 04:41:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) 04:41:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:27 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) [ 159.830909][T14190] loop5: detected capacity change from 0 to 84 04:41:28 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:28 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') 04:41:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:28 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa903, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:28 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:28 executing program 2: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:28 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xaa03, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 160.617661][T14207] loop5: detected capacity change from 0 to 84 04:41:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:28 executing program 2: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:28 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:28 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:28 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xab03, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 160.697508][T14227] loop5: detected capacity change from 0 to 85 [ 160.790301][T14246] loop5: detected capacity change from 0 to 85 04:41:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:29 executing program 2: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:29 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xac03, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:29 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(0x0, 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 161.546642][T14264] loop5: detected capacity change from 0 to 86 04:41:29 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xad03, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 161.681551][T14291] loop5: detected capacity change from 0 to 86 04:41:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:29 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(0x0, 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:29 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xae03, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:30 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(0x0, 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:30 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xbc26, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) [ 162.424243][T14311] loop5: detected capacity change from 0 to 87 04:41:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:30 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) [ 162.531212][T14336] loop5: detected capacity change from 0 to 94 04:41:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:30 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:30 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xca00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:30 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 163.297259][T14356] loop5: detected capacity change from 0 to 101 04:41:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:30 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:30 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) [ 163.434392][T14386] loop5: detected capacity change from 0 to 118 04:41:31 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:31 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:31 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:31 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:31 executing program 4: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:31 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) [ 164.233874][ T22] kauditd_printk_skb: 151 callbacks suppressed [ 164.233888][ T22] audit: type=1326 audit(1634100091.801:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14406 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 164.268709][T14413] loop5: detected capacity change from 0 to 127 04:41:31 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x40000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:31 executing program 4: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:31 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, 0x0, 0x0) [ 164.373658][ T22] audit: type=1326 audit(1634100091.801:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14406 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 164.415721][T14446] loop5: detected capacity change from 0 to 512 [ 164.450488][ T22] audit: type=1326 audit(1634100091.801:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14406 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 164.475225][ T22] audit: type=1326 audit(1634100091.801:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14406 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 164.499997][ T22] audit: type=1326 audit(1634100091.801:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14406 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 164.524610][ T22] audit: type=1326 audit(1634100091.801:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14406 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 164.551348][ T22] audit: type=1326 audit(1634100091.881:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14415 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x0 [ 164.575632][ T22] audit: type=1326 audit(1634100091.971:1971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14435 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x0 04:41:32 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:32 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, 0x0, 0x0) 04:41:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:32 executing program 4: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xe0000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:32 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(0x0, 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:32 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(0x0, 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 165.132062][T14465] loop5: detected capacity change from 0 to 1792 04:41:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:32 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, 0x0, 0x0) 04:41:32 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(0x0, 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) [ 165.229331][T14486] loop5: detected capacity change from 0 to 4095 [ 165.273155][ T22] audit: type=1326 audit(1634100092.841:1972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14492 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 165.304831][ T22] audit: type=1326 audit(1634100092.841:1973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14492 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 04:41:33 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x400000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:33 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:33 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:33 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}], 0x3) 04:41:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:33 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:33 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:33 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}], 0x2) [ 166.007277][T14517] loop5: detected capacity change from 0 to 8192 04:41:33 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:33 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}], 0x1) [ 166.145234][T14546] loop5: detected capacity change from 0 to 32768 04:41:34 executing program 3: perf_event_open(0x0, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:34 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:34 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x10e0000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:34 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400), 0x0) 04:41:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:34 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 166.877641][T14566] loop5: detected capacity change from 0 to 34560 04:41:34 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400), 0x0) 04:41:34 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 167.010650][T14596] loop5: detected capacity change from 0 to 65536 04:41:35 executing program 3: perf_event_open(0x0, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:35 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x76) 04:41:35 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400), 0x0) 04:41:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:35 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x2040000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:35 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:35 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 167.771574][T14613] loop5: detected capacity change from 0 to 66048 04:41:35 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, 0x0, 0x0) 04:41:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) 04:41:35 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) [ 167.874834][T14638] loop5: detected capacity change from 0 to 98304 04:41:36 executing program 3: perf_event_open(0x0, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:36 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, 0x0, 0x0) 04:41:36 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) 04:41:36 executing program 0: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) 04:41:36 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:36 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, 0x0, 0x0) [ 168.640206][T14655] loop5: detected capacity change from 0 to 131072 04:41:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:36 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 04:41:36 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) 04:41:36 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}], 0x3) [ 168.762862][T14679] loop5: detected capacity change from 0 to 163840 04:41:37 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/232, 0xe8) 04:41:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:37 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}], 0x2) 04:41:37 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 169.563133][T14707] loop5: detected capacity change from 0 to 196608 [ 169.590458][ T22] kauditd_printk_skb: 75 callbacks suppressed 04:41:37 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:37 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}], 0x1) 04:41:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 169.590470][ T22] audit: type=1326 audit(1634100097.161:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 04:41:37 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x6040000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:37 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:37 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400), 0x0) 04:41:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) [ 169.689384][ T22] audit: type=1326 audit(1634100097.161:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 169.757626][T14741] loop5: detected capacity change from 0 to 197120 [ 169.764333][ T22] audit: type=1326 audit(1634100097.171:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1559deb994 code=0x7ffc0000 [ 169.792786][ T22] audit: type=1326 audit(1634100097.171:2052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1559deb994 code=0x7ffc0000 [ 169.853725][ T22] audit: type=1326 audit(1634100097.171:2053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 169.878527][ T22] audit: type=1326 audit(1634100097.171:2054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 169.903421][ T22] audit: type=1326 audit(1634100097.171:2055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 169.928109][ T22] audit: type=1326 audit(1634100097.171:2056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 169.952750][ T22] audit: type=1326 audit(1634100097.171:2057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 169.977807][ T22] audit: type=1326 audit(1634100097.171:2058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14701 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 04:41:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:37 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc5", 0x53}], 0x1) 04:41:37 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400), 0x0) 04:41:37 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:38 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400), 0x0) 04:41:38 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) [ 170.448662][T14763] loop5: detected capacity change from 0 to 229376 04:41:38 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:38 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) 04:41:38 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:38 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) 04:41:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) [ 170.586221][T14795] loop5: detected capacity change from 0 to 262144 04:41:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:38 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:38 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) 04:41:38 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x8270000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:38 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:38 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:38 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 171.341705][T14823] loop5: detected capacity change from 0 to 264192 04:41:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) 04:41:38 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:39 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) [ 171.440544][T14846] loop5: detected capacity change from 0 to 264192 [ 171.522206][T14858] loop5: detected capacity change from 0 to 264192 04:41:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:39 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:39 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:39 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:39 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc5", 0x53}], 0x1) 04:41:39 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) 04:41:39 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 1) [ 172.219041][T14881] loop5: detected capacity change from 0 to 264192 [ 172.289242][T14897] FAULT_INJECTION: forcing a failure. [ 172.289242][T14897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.302359][T14897] CPU: 0 PID: 14897 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 172.311127][T14897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.321174][T14897] Call Trace: [ 172.324511][T14897] dump_stack_lvl+0xd6/0x122 [ 172.329111][T14897] dump_stack+0x11/0x1b [ 172.333316][T14897] should_fail+0x23c/0x250 04:41:39 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:39 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xc000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 172.337844][T14897] should_fail_usercopy+0x16/0x20 [ 172.342945][T14897] _copy_from_user+0x1c/0xd0 [ 172.347540][T14897] iovec_from_user+0xc4/0x2e0 [ 172.352242][T14897] ? _kstrtoull+0x301/0x320 [ 172.357008][T14897] __import_iovec+0x57/0x2c0 [ 172.361592][T14897] import_iovec+0x69/0x80 [ 172.365915][T14897] do_writev+0x13c/0x440 [ 172.370146][T14897] ? vfs_write+0x61a/0x900 [ 172.374589][T14897] __x64_sys_writev+0x41/0x50 [ 172.379254][T14897] do_syscall_64+0x44/0xa0 [ 172.383791][T14897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.389739][T14897] RIP: 0033:0x7fd3cbf4da79 [ 172.394136][T14897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 172.413726][T14897] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 172.422121][T14897] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 172.430181][T14897] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 04:41:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) [ 172.438135][T14897] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 [ 172.446089][T14897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.454065][T14897] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 04:41:40 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 2) 04:41:40 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) [ 172.495456][T14908] loop5: detected capacity change from 0 to 264192 [ 172.562627][T14919] FAULT_INJECTION: forcing a failure. [ 172.562627][T14919] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.575874][T14919] CPU: 0 PID: 14919 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 172.584636][T14919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.594723][T14919] Call Trace: [ 172.597994][T14919] dump_stack_lvl+0xd6/0x122 [ 172.602718][T14919] dump_stack+0x11/0x1b [ 172.606872][T14919] should_fail+0x23c/0x250 [ 172.611290][T14919] __alloc_pages+0x102/0x320 [ 172.615974][T14919] alloc_pages+0x382/0x3d0 [ 172.620395][T14919] __page_cache_alloc+0x4d/0xf0 [ 172.625246][T14919] pagecache_get_page+0x5fe/0x910 [ 172.630275][T14919] grab_cache_page_write_begin+0x3f/0x70 [ 172.635975][T14919] ext4_da_write_begin+0x323/0x570 [ 172.641114][T14919] generic_perform_write+0x1b8/0x3e0 [ 172.646384][T14919] ext4_buffered_write_iter+0x305/0x400 [ 172.651910][T14919] ext4_file_write_iter+0x2e7/0x11f0 [ 172.657727][T14919] ? get_page_from_freelist+0x55e/0x830 [ 172.663257][T14919] ? should_fail+0xd6/0x250 [ 172.667829][T14919] ? _copy_from_user+0x94/0xd0 [ 172.672596][T14919] do_iter_readv_writev+0x2de/0x380 [ 172.677825][T14919] do_iter_write+0x192/0x5c0 [ 172.682486][T14919] do_writev+0x210/0x440 [ 172.686710][T14919] ? vfs_write+0x61a/0x900 [ 172.691106][T14919] __x64_sys_writev+0x41/0x50 [ 172.695787][T14919] do_syscall_64+0x44/0xa0 [ 172.700188][T14919] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.706079][T14919] RIP: 0033:0x7fd3cbf4da79 [ 172.710516][T14919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 172.730099][T14919] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 172.738584][T14919] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 172.746540][T14919] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 172.754490][T14919] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 [ 172.762447][T14919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.770405][T14919] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 04:41:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:40 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:40 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) 04:41:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:40 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 3) 04:41:40 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xe000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 173.037312][T14936] loop5: detected capacity change from 0 to 264192 [ 173.103624][T14952] FAULT_INJECTION: forcing a failure. [ 173.103624][T14952] name failslab, interval 1, probability 0, space 0, times 0 [ 173.116342][T14952] CPU: 1 PID: 14952 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 173.125096][T14952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.135157][T14952] Call Trace: [ 173.138424][T14952] dump_stack_lvl+0xd6/0x122 [ 173.143053][T14952] dump_stack+0x11/0x1b [ 173.147192][T14952] should_fail+0x23c/0x250 [ 173.151605][T14952] ? kcalloc+0x32/0x50 [ 173.155668][T14952] __should_failslab+0x81/0x90 [ 173.160852][T14952] should_failslab+0x5/0x20 [ 173.165368][T14952] __kmalloc+0x6f/0x350 [ 173.169520][T14952] ? __crc32c_le_base+0x250/0x350 [ 173.174620][T14952] kcalloc+0x32/0x50 [ 173.178548][T14952] ext4_find_extent+0x21c/0x7f0 [ 173.183391][T14952] ? mark_page_accessed+0x1e3/0x550 [ 173.188581][T14952] ext4_ext_map_blocks+0x115/0x1ff0 [ 173.193769][T14952] ? xas_create+0xadc/0xb30 [ 173.198261][T14952] ? ext4_es_lookup_extent+0x206/0x490 [ 173.203866][T14952] ext4_da_get_block_prep+0x3b4/0x970 [ 173.209229][T14952] __block_write_begin_int+0x4c5/0x1080 [ 173.214794][T14952] ? ext4_da_release_space+0x230/0x230 [ 173.220243][T14952] ? ext4_da_release_space+0x230/0x230 [ 173.225717][T14952] __block_write_begin+0x2b/0x40 [ 173.230651][T14952] ext4_da_write_begin+0x34e/0x570 [ 173.235820][T14952] generic_perform_write+0x1b8/0x3e0 [ 173.241161][T14952] ext4_buffered_write_iter+0x305/0x400 [ 173.246719][T14952] ext4_file_write_iter+0x2e7/0x11f0 [ 173.251991][T14952] ? get_page_from_freelist+0x55e/0x830 [ 173.257528][T14952] ? should_fail+0xd6/0x250 [ 173.262115][T14952] ? _copy_from_user+0x94/0xd0 [ 173.266870][T14952] do_iter_readv_writev+0x2de/0x380 [ 173.272058][T14952] do_iter_write+0x192/0x5c0 [ 173.276651][T14952] do_writev+0x210/0x440 [ 173.280882][T14952] ? vfs_write+0x61a/0x900 [ 173.285323][T14952] __x64_sys_writev+0x41/0x50 [ 173.290048][T14952] do_syscall_64+0x44/0xa0 [ 173.294502][T14952] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.300397][T14952] RIP: 0033:0x7fd3cbf4da79 [ 173.304792][T14952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.324383][T14952] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 173.332800][T14952] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 173.340768][T14952] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 04:41:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:40 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 1) [ 173.348730][T14952] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 [ 173.356776][T14952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.364755][T14952] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 04:41:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) [ 173.402843][T14951] loop5: detected capacity change from 0 to 264192 [ 173.413149][T14957] FAULT_INJECTION: forcing a failure. [ 173.413149][T14957] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 173.426213][T14957] CPU: 1 PID: 14957 Comm: syz-executor.4 Not tainted 5.15.0-rc5-syzkaller #0 [ 173.435107][T14957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.445159][T14957] Call Trace: [ 173.448436][T14957] dump_stack_lvl+0xd6/0x122 [ 173.453029][T14957] dump_stack+0x11/0x1b [ 173.457180][T14957] should_fail+0x23c/0x250 [ 173.461590][T14957] should_fail_usercopy+0x16/0x20 [ 173.466616][T14957] _copy_from_user+0x1c/0xd0 [ 173.471212][T14957] iovec_from_user+0xc4/0x2e0 [ 173.475955][T14957] ? _kstrtoull+0x301/0x320 [ 173.480458][T14957] __import_iovec+0x57/0x2c0 [ 173.485269][T14957] import_iovec+0x69/0x80 [ 173.489728][T14957] do_writev+0x13c/0x440 [ 173.493980][T14957] ? vfs_write+0x61a/0x900 [ 173.498464][T14957] __x64_sys_writev+0x41/0x50 [ 173.503148][T14957] do_syscall_64+0x44/0xa0 [ 173.507572][T14957] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.513589][T14957] RIP: 0033:0x7f455b135a79 [ 173.518048][T14957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.537647][T14957] RSP: 002b:00007f4558ead188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 04:41:41 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 4) 04:41:41 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 173.546048][T14957] RAX: ffffffffffffffda RBX: 00007f455b239f60 RCX: 00007f455b135a79 [ 173.554005][T14957] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 173.561959][T14957] RBP: 00007f4558ead1d0 R08: 0000000000000000 R09: 0000000000000000 [ 173.569925][T14957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.577881][T14957] R13: 00007fff72547e4f R14: 00007f4558ead300 R15: 0000000000022000 04:41:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) [ 173.610671][T14975] FAULT_INJECTION: forcing a failure. [ 173.610671][T14975] name failslab, interval 1, probability 0, space 0, times 0 [ 173.623334][T14975] CPU: 1 PID: 14975 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 173.632094][T14975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.642151][T14975] Call Trace: [ 173.645501][T14975] dump_stack_lvl+0xd6/0x122 [ 173.650093][T14975] dump_stack+0x11/0x1b [ 173.654251][T14975] should_fail+0x23c/0x250 [ 173.658667][T14975] ? __es_insert_extent+0x51f/0xe70 [ 173.663935][T14975] __should_failslab+0x81/0x90 [ 173.668702][T14975] should_failslab+0x5/0x20 [ 173.673287][T14975] kmem_cache_alloc+0x4f/0x300 [ 173.678057][T14975] __es_insert_extent+0x51f/0xe70 [ 173.683072][T14975] ext4_es_insert_extent+0x1cb/0x1950 [ 173.688436][T14975] ext4_ext_map_blocks+0x100a/0x1ff0 [ 173.693721][T14975] ? xas_create+0xadc/0xb30 [ 173.698247][T14975] ext4_da_get_block_prep+0x3b4/0x970 [ 173.703700][T14975] __block_write_begin_int+0x4c5/0x1080 [ 173.709268][T14975] ? ext4_da_release_space+0x230/0x230 [ 173.714718][T14975] ? ext4_da_release_space+0x230/0x230 [ 173.720182][T14975] __block_write_begin+0x2b/0x40 [ 173.725147][T14975] ext4_da_write_begin+0x34e/0x570 [ 173.730309][T14975] generic_perform_write+0x1b8/0x3e0 [ 173.735643][T14975] ext4_buffered_write_iter+0x305/0x400 [ 173.741250][T14975] ext4_file_write_iter+0x2e7/0x11f0 [ 173.746523][T14975] ? get_page_from_freelist+0x55e/0x830 [ 173.752056][T14975] ? should_fail+0xd6/0x250 [ 173.756596][T14975] ? _copy_from_user+0x94/0xd0 [ 173.761359][T14975] do_iter_readv_writev+0x2de/0x380 [ 173.766559][T14975] do_iter_write+0x192/0x5c0 [ 173.771136][T14975] do_writev+0x210/0x440 [ 173.775379][T14975] ? vfs_write+0x61a/0x900 [ 173.779783][T14975] __x64_sys_writev+0x41/0x50 [ 173.784449][T14975] do_syscall_64+0x44/0xa0 [ 173.788860][T14975] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.794746][T14975] RIP: 0033:0x7fd3cbf4da79 [ 173.799158][T14975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.818766][T14975] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 173.827174][T14975] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 173.835128][T14975] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 173.843083][T14975] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 [ 173.851037][T14975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.858991][T14975] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 04:41:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:41 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 2) 04:41:41 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 5) [ 173.886642][T14988] loop5: detected capacity change from 0 to 264192 [ 173.943985][T14998] FAULT_INJECTION: forcing a failure. [ 173.943985][T14998] name failslab, interval 1, probability 0, space 0, times 0 [ 173.956626][T14998] CPU: 0 PID: 14998 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 173.965383][T14998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.968196][T15000] FAULT_INJECTION: forcing a failure. [ 173.968196][T15000] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 173.975426][T14998] Call Trace: [ 173.975434][T14998] dump_stack_lvl+0xd6/0x122 [ 173.975459][T14998] dump_stack+0x11/0x1b [ 174.000665][T14998] should_fail+0x23c/0x250 [ 174.005069][T14998] ? __es_insert_extent+0x51f/0xe70 [ 174.010271][T14998] __should_failslab+0x81/0x90 [ 174.015025][T14998] should_failslab+0x5/0x20 [ 174.019522][T14998] kmem_cache_alloc+0x4f/0x300 [ 174.024565][T14998] __es_insert_extent+0x51f/0xe70 [ 174.029572][T14998] ? ext4_get_reserved_space+0x9/0x20 [ 174.034987][T14998] ext4_es_insert_delayed_block+0x11b/0x390 [ 174.040907][T14998] ext4_da_get_block_prep+0x506/0x970 [ 174.046267][T14998] __block_write_begin_int+0x4c5/0x1080 [ 174.051851][T14998] ? ext4_da_release_space+0x230/0x230 [ 174.057647][T14998] ? ext4_da_release_space+0x230/0x230 [ 174.063102][T14998] __block_write_begin+0x2b/0x40 [ 174.068075][T14998] ext4_da_write_begin+0x34e/0x570 [ 174.073216][T14998] generic_perform_write+0x1b8/0x3e0 [ 174.078507][T14998] ext4_buffered_write_iter+0x305/0x400 [ 174.084042][T14998] ext4_file_write_iter+0x2e7/0x11f0 [ 174.089363][T14998] ? get_page_from_freelist+0x55e/0x830 [ 174.094916][T14998] ? should_fail+0xd6/0x250 [ 174.099402][T14998] ? _copy_from_user+0x94/0xd0 [ 174.104165][T14998] do_iter_readv_writev+0x2de/0x380 [ 174.109369][T14998] do_iter_write+0x192/0x5c0 [ 174.113945][T14998] do_writev+0x210/0x440 [ 174.118177][T14998] ? vfs_write+0x61a/0x900 [ 174.122581][T14998] __x64_sys_writev+0x41/0x50 [ 174.127249][T14998] do_syscall_64+0x44/0xa0 [ 174.131696][T14998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.137633][T14998] RIP: 0033:0x7fd3cbf4da79 [ 174.142031][T14998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.162246][T14998] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 174.170653][T14998] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 174.178614][T14998] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 174.186569][T14998] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 04:41:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:41 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x10000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 174.194585][T14998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.202567][T14998] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 [ 174.210566][T15000] CPU: 1 PID: 15000 Comm: syz-executor.4 Not tainted 5.15.0-rc5-syzkaller #0 [ 174.219329][T15000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.229377][T15000] Call Trace: [ 174.232699][T15000] dump_stack_lvl+0xd6/0x122 [ 174.237292][T15000] dump_stack+0x11/0x1b [ 174.241443][T15000] should_fail+0x23c/0x250 [ 174.245875][T15000] __alloc_pages+0x102/0x320 [ 174.250533][T15000] alloc_pages+0x382/0x3d0 [ 174.254953][T15000] __page_cache_alloc+0x4d/0xf0 [ 174.259954][T15000] pagecache_get_page+0x5fe/0x910 [ 174.265039][T15000] grab_cache_page_write_begin+0x3f/0x70 [ 174.270718][T15000] ext4_da_write_begin+0x323/0x570 [ 174.275888][T15000] generic_perform_write+0x1b8/0x3e0 [ 174.281286][T15000] ext4_buffered_write_iter+0x305/0x400 [ 174.286857][T15000] ext4_file_write_iter+0x2e7/0x11f0 [ 174.292131][T15000] ? get_page_from_freelist+0x55e/0x830 [ 174.297775][T15000] ? should_fail+0xd6/0x250 [ 174.302392][T15000] ? _copy_from_user+0x94/0xd0 [ 174.307161][T15000] do_iter_readv_writev+0x2de/0x380 [ 174.312353][T15000] do_iter_write+0x192/0x5c0 [ 174.317023][T15000] do_writev+0x210/0x440 [ 174.321364][T15000] ? vfs_write+0x61a/0x900 [ 174.325766][T15000] __x64_sys_writev+0x41/0x50 [ 174.330430][T15000] do_syscall_64+0x44/0xa0 [ 174.334836][T15000] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.340726][T15000] RIP: 0033:0x7f455b135a79 [ 174.345123][T15000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.365242][T15000] RSP: 002b:00007f4558ead188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 174.373703][T15000] RAX: ffffffffffffffda RBX: 00007f455b239f60 RCX: 00007f455b135a79 [ 174.381694][T15000] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 04:41:42 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) [ 174.389652][T15000] RBP: 00007f4558ead1d0 R08: 0000000000000000 R09: 0000000000000000 [ 174.397684][T15000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.405643][T15000] R13: 00007fff72547e4f R14: 00007f4558ead300 R15: 0000000000022000 04:41:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:42 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 3) 04:41:42 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 6) [ 174.497813][T15022] loop5: detected capacity change from 0 to 264192 [ 174.500280][T15020] FAULT_INJECTION: forcing a failure. [ 174.500280][T15020] name failslab, interval 1, probability 0, space 0, times 0 [ 174.516973][T15020] CPU: 0 PID: 15020 Comm: syz-executor.4 Not tainted 5.15.0-rc5-syzkaller #0 [ 174.519100][T15023] FAULT_INJECTION: forcing a failure. [ 174.519100][T15023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.525788][T15020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.525801][T15020] Call Trace: [ 174.525808][T15020] dump_stack_lvl+0xd6/0x122 [ 174.525834][T15020] dump_stack+0x11/0x1b [ 174.525850][T15020] should_fail+0x23c/0x250 [ 174.525866][T15020] ? kcalloc+0x32/0x50 [ 174.569316][T15020] __should_failslab+0x81/0x90 [ 174.574140][T15020] should_failslab+0x5/0x20 [ 174.578635][T15020] __kmalloc+0x6f/0x350 [ 174.582788][T15020] ? __crc32c_le_base+0x250/0x350 [ 174.587837][T15020] kcalloc+0x32/0x50 [ 174.591723][T15020] ext4_find_extent+0x21c/0x7f0 [ 174.596566][T15020] ? mark_page_accessed+0x1e3/0x550 [ 174.601763][T15020] ext4_ext_map_blocks+0x115/0x1ff0 [ 174.606947][T15020] ? xas_create+0xadc/0xb30 [ 174.611438][T15020] ? ext4_es_lookup_extent+0x206/0x490 [ 174.616949][T15020] ext4_da_get_block_prep+0x3b4/0x970 [ 174.622322][T15020] __block_write_begin_int+0x4c5/0x1080 [ 174.627935][T15020] ? ext4_da_release_space+0x230/0x230 [ 174.633446][T15020] ? ext4_da_release_space+0x230/0x230 [ 174.638976][T15020] __block_write_begin+0x2b/0x40 [ 174.643932][T15020] ext4_da_write_begin+0x34e/0x570 [ 174.649097][T15020] generic_perform_write+0x1b8/0x3e0 [ 174.654391][T15020] ext4_buffered_write_iter+0x305/0x400 [ 174.659921][T15020] ext4_file_write_iter+0x2e7/0x11f0 [ 174.665193][T15020] ? get_page_from_freelist+0x55e/0x830 [ 174.670729][T15020] ? should_fail+0xd6/0x250 [ 174.675234][T15020] ? _copy_from_user+0x94/0xd0 [ 174.679988][T15020] do_iter_readv_writev+0x2de/0x380 [ 174.685178][T15020] do_iter_write+0x192/0x5c0 [ 174.689809][T15020] do_writev+0x210/0x440 [ 174.694038][T15020] ? vfs_write+0x61a/0x900 [ 174.698444][T15020] __x64_sys_writev+0x41/0x50 [ 174.703107][T15020] do_syscall_64+0x44/0xa0 [ 174.707578][T15020] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.713476][T15020] RIP: 0033:0x7f455b135a79 [ 174.717874][T15020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.737464][T15020] RSP: 002b:00007f4558ead188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 174.745855][T15020] RAX: ffffffffffffffda RBX: 00007f455b239f60 RCX: 00007f455b135a79 [ 174.753808][T15020] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 174.761763][T15020] RBP: 00007f4558ead1d0 R08: 0000000000000000 R09: 0000000000000000 [ 174.769743][T15020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.777746][T15020] R13: 00007fff72547e4f R14: 00007f4558ead300 R15: 0000000000022000 [ 174.785703][T15023] CPU: 1 PID: 15023 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 174.794465][T15023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.804663][T15023] Call Trace: [ 174.807930][T15023] dump_stack_lvl+0xd6/0x122 [ 174.812953][T15023] dump_stack+0x11/0x1b [ 174.817092][T15023] should_fail+0x23c/0x250 [ 174.821509][T15023] should_fail_usercopy+0x16/0x20 [ 174.826583][T15023] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 174.832306][T15023] generic_perform_write+0x201/0x3e0 [ 174.837603][T15023] ext4_buffered_write_iter+0x305/0x400 [ 174.843150][T15023] ext4_file_write_iter+0x2e7/0x11f0 [ 174.848462][T15023] ? get_page_from_freelist+0x55e/0x830 [ 174.854069][T15023] ? should_fail+0xd6/0x250 [ 174.858553][T15023] ? _copy_from_user+0x94/0xd0 [ 174.863315][T15023] do_iter_readv_writev+0x2de/0x380 [ 174.868502][T15023] do_iter_write+0x192/0x5c0 [ 174.873080][T15023] do_writev+0x210/0x440 [ 174.877318][T15023] ? vfs_write+0x61a/0x900 [ 174.881784][T15023] __x64_sys_writev+0x41/0x50 [ 174.886507][T15023] do_syscall_64+0x44/0xa0 [ 174.890954][T15023] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 174.896837][T15023] RIP: 0033:0x7fd3cbf4da79 [ 174.901302][T15023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.920935][T15023] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 174.929344][T15023] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 174.937304][T15023] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 04:41:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:42 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 7) [ 174.945257][T15023] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 [ 174.953213][T15023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.961167][T15023] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 04:41:42 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 175.019925][T15035] FAULT_INJECTION: forcing a failure. [ 175.019925][T15035] name failslab, interval 1, probability 0, space 0, times 0 [ 175.032552][T15035] CPU: 1 PID: 15035 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 175.041383][T15035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.046360][ T22] kauditd_printk_skb: 234 callbacks suppressed [ 175.046371][ T22] audit: type=1326 audit(1634100102.601:2293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 175.051530][T15035] Call Trace: [ 175.059996][ T22] audit: type=1326 audit(1634100102.601:2294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 175.082952][T15035] dump_stack_lvl+0xd6/0x122 [ 175.082977][T15035] dump_stack+0x11/0x1b [ 175.119472][T15035] should_fail+0x23c/0x250 [ 175.123916][T15035] ? ext4_init_io_end+0x2d/0xa0 [ 175.128752][T15035] __should_failslab+0x81/0x90 [ 175.133516][T15035] should_failslab+0x5/0x20 [ 175.138008][T15035] kmem_cache_alloc+0x4f/0x300 [ 175.142753][T15035] ext4_init_io_end+0x2d/0xa0 [ 175.147456][T15035] ext4_writepages+0x6e5/0x1d70 [ 175.152295][T15035] ? __brelse+0x2c/0x50 [ 175.156763][T15035] ? ext4_mark_iloc_dirty+0x161a/0x1700 [ 175.162315][T15035] ? ext4_dirty_inode+0x58/0xa0 [ 175.167181][T15035] ? __ext4_journal_stop+0x47/0x110 [ 175.172367][T15035] ? ext4_expand_extra_isize+0x560/0x560 [ 175.178049][T15035] ? ext4_dirty_inode+0x9a/0xa0 [ 175.182887][T15035] ? ext4_readpage+0x140/0x140 [ 175.187636][T15035] do_writepages+0x26b/0x3c0 [ 175.192276][T15035] ? generic_write_end+0x157/0x180 [ 175.197384][T15035] file_write_and_wait_range+0x1ae/0x240 [ 175.203001][T15035] ext4_sync_file+0x105/0x670 [ 175.207664][T15035] ? tsan.module_ctor+0x10/0x10 [ 175.212565][T15035] vfs_fsync_range+0x107/0x120 [ 175.217439][T15035] ext4_buffered_write_iter+0x3af/0x400 [ 175.223068][T15035] ext4_file_write_iter+0x2e7/0x11f0 [ 175.228339][T15035] ? get_page_from_freelist+0x55e/0x830 [ 175.233878][T15035] ? should_fail+0xd6/0x250 [ 175.238411][T15035] ? _copy_from_user+0x94/0xd0 [ 175.243256][T15035] do_iter_readv_writev+0x2de/0x380 [ 175.248462][T15035] do_iter_write+0x192/0x5c0 [ 175.253075][T15035] do_writev+0x210/0x440 [ 175.257299][T15035] ? vfs_write+0x61a/0x900 [ 175.261699][T15035] __x64_sys_writev+0x41/0x50 [ 175.266437][T15035] do_syscall_64+0x44/0xa0 [ 175.270907][T15035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 175.276835][T15035] RIP: 0033:0x7fd3cbf4da79 [ 175.281239][T15035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.300828][T15035] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 175.309298][T15035] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 04:41:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) 04:41:42 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) [ 175.317251][T15035] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 175.327378][T15035] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 [ 175.335340][T15035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.343472][T15035] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 04:41:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x76) 04:41:42 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) [ 175.397317][ T22] audit: type=1326 audit(1634100102.961:2295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15042 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 04:41:43 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x2}], 0x1) 04:41:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) 04:41:43 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 8) [ 175.480621][T15055] loop5: detected capacity change from 0 to 264192 [ 175.500535][ T22] audit: type=1326 audit(1634100102.961:2296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15042 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 04:41:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 1) 04:41:43 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x3}], 0x1) [ 175.586212][ T22] audit: type=1326 audit(1634100102.961:2297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15042 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 175.620195][T15079] FAULT_INJECTION: forcing a failure. [ 175.620195][T15079] name failslab, interval 1, probability 0, space 0, times 0 [ 175.620828][T15080] FAULT_INJECTION: forcing a failure. [ 175.620828][T15080] name failslab, interval 1, probability 0, space 0, times 0 [ 175.632844][T15079] CPU: 1 PID: 15079 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 175.654132][T15079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.664170][T15079] Call Trace: [ 175.667431][T15079] dump_stack_lvl+0xd6/0x122 [ 175.672011][T15079] dump_stack+0x11/0x1b [ 175.676207][T15079] should_fail+0x23c/0x250 [ 175.680613][T15079] ? ext4_init_io_end+0x2d/0xa0 [ 175.685447][T15079] __should_failslab+0x81/0x90 [ 175.690261][T15079] should_failslab+0x5/0x20 [ 175.694748][T15079] kmem_cache_alloc+0x4f/0x300 [ 175.699495][T15079] ext4_init_io_end+0x2d/0xa0 [ 175.704230][T15079] ext4_writepages+0x7ad/0x1d70 [ 175.709109][T15079] ? __brelse+0x2c/0x50 [ 175.713262][T15079] ? ext4_mark_iloc_dirty+0x161a/0x1700 [ 175.718793][T15079] ? ext4_dirty_inode+0x58/0xa0 [ 175.723640][T15079] ? __ext4_journal_stop+0x47/0x110 [ 175.728866][T15079] ? ext4_expand_extra_isize+0x560/0x560 [ 175.734482][T15079] ? ext4_dirty_inode+0x9a/0xa0 [ 175.739316][T15079] ? ext4_readpage+0x140/0x140 [ 175.744071][T15079] do_writepages+0x26b/0x3c0 [ 175.748676][T15079] ? generic_write_end+0x157/0x180 [ 175.753767][T15079] file_write_and_wait_range+0x1ae/0x240 [ 175.759388][T15079] ext4_sync_file+0x105/0x670 [ 175.764045][T15079] ? tsan.module_ctor+0x10/0x10 [ 175.768876][T15079] vfs_fsync_range+0x107/0x120 [ 175.773624][T15079] ext4_buffered_write_iter+0x3af/0x400 [ 175.779175][T15079] ext4_file_write_iter+0x2e7/0x11f0 [ 175.784505][T15079] ? get_page_from_freelist+0x55e/0x830 [ 175.790039][T15079] ? should_fail+0xd6/0x250 [ 175.794531][T15079] ? _copy_from_user+0x94/0xd0 [ 175.799297][T15079] do_iter_readv_writev+0x2de/0x380 [ 175.804538][T15079] do_iter_write+0x192/0x5c0 [ 175.809113][T15079] do_writev+0x210/0x440 [ 175.813355][T15079] ? vfs_write+0x61a/0x900 [ 175.817757][T15079] __x64_sys_writev+0x41/0x50 [ 175.822445][T15079] do_syscall_64+0x44/0xa0 [ 175.826889][T15079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 175.832824][T15079] RIP: 0033:0x7fd3cbf4da79 [ 175.837231][T15079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.856909][T15079] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 175.865311][T15079] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 175.873526][T15079] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 175.881479][T15079] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 [ 175.889433][T15079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.897415][T15079] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 [ 175.905380][T15080] CPU: 0 PID: 15080 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 175.914135][T15080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.920589][ T22] audit: type=1326 audit(1634100102.961:2298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15042 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 175.924182][T15080] Call Trace: [ 175.924190][T15080] dump_stack_lvl+0xd6/0x122 [ 175.949234][ T22] audit: type=1326 audit(1634100102.961:2299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15042 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 175.951996][T15080] dump_stack+0x11/0x1b [ 175.952018][T15080] should_fail+0x23c/0x250 [ 175.952036][T15080] ? audit_log_start+0x351/0x6b0 [ 175.958203][ T22] audit: type=1326 audit(1634100102.961:2300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15042 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 175.981127][T15080] __should_failslab+0x81/0x90 [ 175.981162][T15080] should_failslab+0x5/0x20 04:41:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:43 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x12000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 175.986350][ T22] audit: type=1326 audit(1634100102.961:2301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15042 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 175.989686][T15080] kmem_cache_alloc+0x4f/0x300 [ 175.989707][T15080] audit_log_start+0x351/0x6b0 [ 175.989730][T15080] audit_seccomp+0x45/0xf0 [ 175.989745][T15080] __seccomp_filter+0x515/0xe40 [ 175.989762][T15080] ? proc_fail_nth_write+0x127/0x150 04:41:43 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x4}], 0x1) 04:41:43 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 9) [ 175.996117][ T22] audit: type=1326 audit(1634100102.961:2302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15042 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 176.019220][T15080] ? vfs_write+0x61a/0x900 [ 176.019244][T15080] ? putname+0xb8/0xd0 [ 176.019265][T15080] __secure_computing+0xfb/0x140 [ 176.114819][T15080] syscall_trace_enter+0x120/0x290 [ 176.119931][T15080] ? exit_to_user_mode_prepare+0x65/0x190 [ 176.125646][T15080] syscall_enter_from_user_mode+0x1c/0x20 [ 176.131364][T15080] do_syscall_64+0x25/0xa0 [ 176.133064][T15090] FAULT_INJECTION: forcing a failure. [ 176.133064][T15090] name failslab, interval 1, probability 0, space 0, times 0 [ 176.135822][T15080] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.135852][T15080] RIP: 0033:0x7f1af1b34a79 [ 176.135864][T15080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.135880][T15080] RSP: 002b:00007f1aef8ac188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 176.186657][T15080] RAX: ffffffffffffffda RBX: 00007f1af1c38f60 RCX: 00007f1af1b34a79 [ 176.194612][T15080] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 176.202568][T15080] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 176.210565][T15080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.218524][T15080] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 [ 176.226483][T15090] CPU: 1 PID: 15090 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 176.235244][T15090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.245353][T15090] Call Trace: [ 176.248621][T15090] dump_stack_lvl+0xd6/0x122 [ 176.253212][T15090] dump_stack+0x11/0x1b [ 176.257388][T15090] should_fail+0x23c/0x250 [ 176.261831][T15090] ? ext4_alloc_io_end_vec+0x2e/0xd0 [ 176.267149][T15090] __should_failslab+0x81/0x90 [ 176.271990][T15090] should_failslab+0x5/0x20 [ 176.276477][T15090] kmem_cache_alloc+0x4f/0x300 [ 176.281222][T15090] ext4_alloc_io_end_vec+0x2e/0xd0 [ 176.286315][T15090] ext4_writepages+0xacd/0x1d70 [ 176.291163][T15090] ? __brelse+0x2c/0x50 [ 176.295368][T15090] ? ext4_mark_iloc_dirty+0x161a/0x1700 [ 176.300911][T15090] ? ext4_dirty_inode+0x58/0xa0 [ 176.305765][T15090] ? __ext4_journal_stop+0x47/0x110 [ 176.311146][T15090] ? ext4_expand_extra_isize+0x560/0x560 [ 176.316762][T15090] ? ext4_dirty_inode+0x9a/0xa0 [ 176.321595][T15090] ? ext4_readpage+0x140/0x140 [ 176.326382][T15090] do_writepages+0x26b/0x3c0 [ 176.330954][T15090] ? generic_write_end+0x157/0x180 [ 176.336047][T15090] file_write_and_wait_range+0x1ae/0x240 [ 176.341781][T15090] ext4_sync_file+0x105/0x670 [ 176.346440][T15090] ? tsan.module_ctor+0x10/0x10 [ 176.351272][T15090] vfs_fsync_range+0x107/0x120 [ 176.356017][T15090] ext4_buffered_write_iter+0x3af/0x400 [ 176.361564][T15090] ext4_file_write_iter+0x2e7/0x11f0 [ 176.366834][T15090] ? get_page_from_freelist+0x55e/0x830 [ 176.372598][T15090] ? should_fail+0xd6/0x250 [ 176.377086][T15090] ? _copy_from_user+0x94/0xd0 [ 176.381852][T15090] do_iter_readv_writev+0x2de/0x380 [ 176.387170][T15090] do_iter_write+0x192/0x5c0 [ 176.391751][T15090] do_writev+0x210/0x440 [ 176.395976][T15090] ? vfs_write+0x61a/0x900 [ 176.400380][T15090] __x64_sys_writev+0x41/0x50 [ 176.405042][T15090] do_syscall_64+0x44/0xa0 [ 176.409518][T15090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.415478][T15090] RIP: 0033:0x7fd3cbf4da79 [ 176.419874][T15090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:41:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 2) 04:41:44 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) [ 176.439469][T15090] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 176.447887][T15090] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 176.455925][T15090] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 176.463897][T15090] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 [ 176.471849][T15090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.479801][T15090] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 [ 176.524614][T15101] FAULT_INJECTION: forcing a failure. [ 176.524614][T15101] name failslab, interval 1, probability 0, space 0, times 0 [ 176.534073][T15096] loop5: detected capacity change from 0 to 264192 [ 176.537269][T15101] CPU: 0 PID: 15101 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 176.552561][T15101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.562598][T15101] Call Trace: [ 176.565860][T15101] dump_stack_lvl+0xd6/0x122 [ 176.570436][T15101] dump_stack+0x11/0x1b [ 176.574572][T15101] should_fail+0x23c/0x250 [ 176.578968][T15101] __should_failslab+0x81/0x90 [ 176.583721][T15101] should_failslab+0x5/0x20 [ 176.588209][T15101] kmem_cache_alloc_node+0x61/0x2c0 [ 176.593388][T15101] ? should_fail+0xd6/0x250 [ 176.597869][T15101] ? __alloc_skb+0xed/0x420 [ 176.602354][T15101] __alloc_skb+0xed/0x420 [ 176.606666][T15101] audit_log_start+0x36d/0x6b0 [ 176.611426][T15101] audit_seccomp+0x45/0xf0 [ 176.616010][T15101] __seccomp_filter+0x515/0xe40 [ 176.620842][T15101] ? proc_fail_nth_write+0x127/0x150 [ 176.626153][T15101] ? vfs_write+0x61a/0x900 [ 176.630572][T15101] ? putname+0xb8/0xd0 [ 176.634658][T15101] __secure_computing+0xfb/0x140 [ 176.639577][T15101] syscall_trace_enter+0x120/0x290 [ 176.644673][T15101] ? exit_to_user_mode_prepare+0x65/0x190 [ 176.650433][T15101] syscall_enter_from_user_mode+0x1c/0x20 [ 176.656133][T15101] do_syscall_64+0x25/0xa0 [ 176.660590][T15101] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.666469][T15101] RIP: 0033:0x7f1af1b34a79 [ 176.670867][T15101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.690456][T15101] RSP: 002b:00007f1aef8ac188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 176.698882][T15101] RAX: ffffffffffffffda RBX: 00007f1af1c38f60 RCX: 00007f1af1b34a79 [ 176.706842][T15101] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 176.714792][T15101] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 04:41:44 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x5}], 0x1) 04:41:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 3) [ 176.722742][T15101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.730693][T15101] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 04:41:44 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:44 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x6}], 0x1) [ 176.807894][T15118] FAULT_INJECTION: forcing a failure. [ 176.807894][T15118] name failslab, interval 1, probability 0, space 0, times 0 [ 176.820603][T15118] CPU: 0 PID: 15118 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 176.829366][T15118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.839414][T15118] Call Trace: [ 176.842689][T15118] dump_stack_lvl+0xd6/0x122 [ 176.847276][T15118] dump_stack+0x11/0x1b [ 176.851449][T15118] should_fail+0x23c/0x250 04:41:44 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 10) [ 176.855863][T15118] __should_failslab+0x81/0x90 [ 176.860627][T15118] should_failslab+0x5/0x20 [ 176.865130][T15118] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 176.870911][T15118] ? __kmalloc_node_track_caller+0x30/0x40 [ 176.876721][T15118] __kmalloc_node_track_caller+0x30/0x40 [ 176.882354][T15118] ? audit_log_start+0x36d/0x6b0 [ 176.887303][T15118] __alloc_skb+0x187/0x420 [ 176.891781][T15118] audit_log_start+0x36d/0x6b0 [ 176.896603][T15118] audit_seccomp+0x45/0xf0 [ 176.896866][T15128] FAULT_INJECTION: forcing a failure. [ 176.896866][T15128] name failslab, interval 1, probability 0, space 0, times 0 [ 176.901149][T15118] __seccomp_filter+0x515/0xe40 [ 176.901171][T15118] ? proc_fail_nth_write+0x127/0x150 [ 176.923852][T15118] ? vfs_write+0x61a/0x900 [ 176.928254][T15118] ? putname+0xb8/0xd0 [ 176.932365][T15118] __secure_computing+0xfb/0x140 [ 176.937360][T15118] syscall_trace_enter+0x120/0x290 [ 176.942539][T15118] ? exit_to_user_mode_prepare+0x65/0x190 [ 176.948242][T15118] syscall_enter_from_user_mode+0x1c/0x20 [ 176.953943][T15118] do_syscall_64+0x25/0xa0 [ 176.958424][T15118] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 176.964361][T15118] RIP: 0033:0x7f1af1b34a79 [ 176.968819][T15118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 176.988771][T15118] RSP: 002b:00007f1aef8ac188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 176.997165][T15118] RAX: ffffffffffffffda RBX: 00007f1af1c38f60 RCX: 00007f1af1b34a79 [ 177.005119][T15118] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 177.013071][T15118] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 177.021019][T15118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.028974][T15118] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 [ 177.036927][T15128] CPU: 1 PID: 15128 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 177.045682][T15128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.055730][T15128] Call Trace: [ 177.059018][T15128] dump_stack_lvl+0xd6/0x122 [ 177.063603][T15128] dump_stack+0x11/0x1b [ 177.067742][T15128] should_fail+0x23c/0x250 [ 177.072142][T15128] ? kcalloc+0x32/0x50 [ 177.076197][T15128] __should_failslab+0x81/0x90 [ 177.080944][T15128] should_failslab+0x5/0x20 [ 177.085466][T15128] __kmalloc+0x6f/0x350 [ 177.089617][T15128] kcalloc+0x32/0x50 [ 177.093495][T15128] ext4_find_extent+0x21c/0x7f0 [ 177.098330][T15128] ext4_ext_map_blocks+0x115/0x1ff0 [ 177.103553][T15128] ? ext4_es_lookup_extent+0x36b/0x490 [ 177.109000][T15128] ext4_map_blocks+0x71e/0xf00 [ 177.113749][T15128] mpage_map_one_extent+0x10d/0x360 [ 177.118935][T15128] ext4_writepages+0xc5a/0x1d70 [ 177.123835][T15128] ? __brelse+0x2c/0x50 [ 177.127976][T15128] ? ext4_mark_iloc_dirty+0x161a/0x1700 [ 177.133573][T15128] ? ext4_dirty_inode+0x58/0xa0 [ 177.138405][T15128] ? __ext4_journal_stop+0x47/0x110 [ 177.143592][T15128] ? ext4_expand_extra_isize+0x560/0x560 [ 177.149284][T15128] ? ext4_dirty_inode+0x9a/0xa0 [ 177.154181][T15128] ? ext4_readpage+0x140/0x140 [ 177.158927][T15128] do_writepages+0x26b/0x3c0 [ 177.163512][T15128] ? generic_write_end+0x157/0x180 [ 177.168607][T15128] file_write_and_wait_range+0x1ae/0x240 [ 177.174253][T15128] ext4_sync_file+0x105/0x670 [ 177.178913][T15128] ? tsan.module_ctor+0x10/0x10 [ 177.183806][T15128] vfs_fsync_range+0x107/0x120 [ 177.188574][T15128] ext4_buffered_write_iter+0x3af/0x400 [ 177.194102][T15128] ext4_file_write_iter+0x2e7/0x11f0 [ 177.199448][T15128] ? get_page_from_freelist+0x55e/0x830 [ 177.204990][T15128] ? should_fail+0xd6/0x250 [ 177.209472][T15128] ? _copy_from_user+0x94/0xd0 [ 177.214231][T15128] do_iter_readv_writev+0x2de/0x380 [ 177.219620][T15128] do_iter_write+0x192/0x5c0 [ 177.224194][T15128] do_writev+0x210/0x440 [ 177.228502][T15128] ? vfs_write+0x61a/0x900 [ 177.232942][T15128] __x64_sys_writev+0x41/0x50 [ 177.237614][T15128] do_syscall_64+0x44/0xa0 [ 177.242015][T15128] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.247894][T15128] RIP: 0033:0x7fd3cbf4da79 [ 177.252322][T15128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.271914][T15128] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 177.280317][T15128] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 177.288352][T15128] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 177.296305][T15128] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 04:41:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 4) 04:41:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:44 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x7}], 0x1) [ 177.304277][T15128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 177.312231][T15128] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 04:41:45 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 11) [ 177.383616][T15139] FAULT_INJECTION: forcing a failure. [ 177.383616][T15139] name failslab, interval 1, probability 0, space 0, times 0 [ 177.396315][T15139] CPU: 0 PID: 15139 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 177.405072][T15139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.408644][T15142] loop5: detected capacity change from 0 to 264192 [ 177.415143][T15139] Call Trace: [ 177.415153][T15139] dump_stack_lvl+0xd6/0x122 [ 177.429480][T15139] dump_stack+0x11/0x1b 04:41:45 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1b000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 177.433693][T15139] should_fail+0x23c/0x250 [ 177.438109][T15139] ? sidtab_sid2str_get+0x9c/0x130 [ 177.443296][T15139] __should_failslab+0x81/0x90 [ 177.448059][T15139] should_failslab+0x5/0x20 [ 177.452605][T15139] __kmalloc_track_caller+0x6d/0x350 [ 177.457977][T15139] ? vsnprintf+0xe8f/0xed0 [ 177.462394][T15139] kmemdup+0x21/0x50 [ 177.466303][T15139] sidtab_sid2str_get+0x9c/0x130 [ 177.471234][T15139] security_sid_to_context_core+0x1cb/0x2d0 [ 177.477223][T15139] security_sid_to_context+0x2c/0x40 04:41:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) [ 177.482535][T15139] selinux_secid_to_secctx+0x25/0x30 [ 177.487815][T15139] security_secid_to_secctx+0x45/0xa0 [ 177.493182][T15139] audit_log_task_context+0x91/0x1c0 [ 177.498471][T15139] audit_log_task+0xfd/0x180 [ 177.503062][T15139] audit_seccomp+0x5e/0xf0 [ 177.507522][T15139] __seccomp_filter+0x515/0xe40 [ 177.512369][T15139] ? proc_fail_nth_write+0x127/0x150 [ 177.517666][T15139] ? vfs_write+0x61a/0x900 [ 177.522077][T15139] __secure_computing+0xfb/0x140 [ 177.527016][T15139] syscall_trace_enter+0x120/0x290 [ 177.532130][T15139] ? switch_fpu_return+0xa/0x10 [ 177.536970][T15139] ? exit_to_user_mode_prepare+0x65/0x190 [ 177.541694][T15155] FAULT_INJECTION: forcing a failure. [ 177.541694][T15155] name failslab, interval 1, probability 0, space 0, times 0 [ 177.542764][T15139] syscall_enter_from_user_mode+0x1c/0x20 [ 177.542788][T15139] do_syscall_64+0x25/0xa0 [ 177.565418][T15139] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.571378][T15139] RIP: 0033:0x7f1af1b34a79 [ 177.575775][T15139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.595367][T15139] RSP: 002b:00007f1aef8ac188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 177.603785][T15139] RAX: ffffffffffffffda RBX: 00007f1af1c38f60 RCX: 00007f1af1b34a79 [ 177.612442][T15139] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 177.620444][T15139] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 177.628396][T15139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.636347][T15139] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 [ 177.644332][T15155] CPU: 1 PID: 15155 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 177.653095][T15155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.663142][T15155] Call Trace: [ 177.666409][T15155] dump_stack_lvl+0xd6/0x122 [ 177.670998][T15155] dump_stack+0x11/0x1b [ 177.675142][T15155] should_fail+0x23c/0x250 [ 177.679546][T15155] ? ext4_mb_new_blocks+0x317/0x1fc0 [ 177.684933][T15155] __should_failslab+0x81/0x90 [ 177.689678][T15155] should_failslab+0x5/0x20 [ 177.694164][T15155] kmem_cache_alloc+0x4f/0x300 [ 177.698973][T15155] ext4_mb_new_blocks+0x317/0x1fc0 [ 177.704064][T15155] ? ext4_find_extent+0x6cf/0x7f0 [ 177.709095][T15155] ? ext4_ext_search_right+0x300/0x540 [ 177.714534][T15155] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 177.720251][T15155] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 177.725515][T15155] ? ext4_es_lookup_extent+0x36b/0x490 [ 177.730965][T15155] ext4_map_blocks+0x71e/0xf00 [ 177.735715][T15155] mpage_map_one_extent+0x10d/0x360 [ 177.740899][T15155] ext4_writepages+0xc5a/0x1d70 [ 177.745750][T15155] ? __brelse+0x2c/0x50 [ 177.749970][T15155] ? ext4_mark_iloc_dirty+0x161a/0x1700 [ 177.755502][T15155] ? ext4_dirty_inode+0x58/0xa0 [ 177.760339][T15155] ? __ext4_journal_stop+0x47/0x110 [ 177.765528][T15155] ? ext4_expand_extra_isize+0x560/0x560 [ 177.771152][T15155] ? ext4_dirty_inode+0x9a/0xa0 [ 177.776019][T15155] ? ext4_readpage+0x140/0x140 [ 177.780765][T15155] do_writepages+0x26b/0x3c0 [ 177.785338][T15155] ? generic_write_end+0x157/0x180 [ 177.790426][T15155] file_write_and_wait_range+0x1ae/0x240 [ 177.796062][T15155] ext4_sync_file+0x105/0x670 [ 177.800719][T15155] ? tsan.module_ctor+0x10/0x10 [ 177.805552][T15155] vfs_fsync_range+0x107/0x120 [ 177.810295][T15155] ext4_buffered_write_iter+0x3af/0x400 [ 177.815893][T15155] ext4_file_write_iter+0x2e7/0x11f0 [ 177.821163][T15155] ? get_page_from_freelist+0x55e/0x830 [ 177.826692][T15155] ? should_fail+0xd6/0x250 [ 177.831177][T15155] ? _copy_from_user+0x94/0xd0 [ 177.835939][T15155] do_iter_readv_writev+0x2de/0x380 [ 177.841122][T15155] do_iter_write+0x192/0x5c0 [ 177.845751][T15155] do_writev+0x210/0x440 [ 177.849980][T15155] ? vfs_write+0x61a/0x900 [ 177.854378][T15155] __x64_sys_writev+0x41/0x50 [ 177.859037][T15155] do_syscall_64+0x44/0xa0 [ 177.863450][T15155] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 177.869330][T15155] RIP: 0033:0x7fd3cbf4da79 [ 177.873802][T15155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.893471][T15155] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 177.901861][T15155] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 177.909810][T15155] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 177.917762][T15155] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 [ 177.925711][T15155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 04:41:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 5) 04:41:45 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x8}], 0x1) [ 177.933658][T15155] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 04:41:45 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 12) [ 177.988242][T15165] FAULT_INJECTION: forcing a failure. [ 177.988242][T15165] name failslab, interval 1, probability 0, space 0, times 0 [ 178.000897][T15165] CPU: 0 PID: 15165 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 178.009659][T15165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.019707][T15165] Call Trace: [ 178.022981][T15165] dump_stack_lvl+0xd6/0x122 [ 178.027571][T15165] dump_stack+0x11/0x1b [ 178.031175][T15175] FAULT_INJECTION: forcing a failure. [ 178.031175][T15175] name failslab, interval 1, probability 0, space 0, times 0 [ 178.031727][T15165] should_fail+0x23c/0x250 [ 178.031748][T15165] __should_failslab+0x81/0x90 [ 178.053421][T15165] ? audit_log_d_path+0x97/0x200 [ 178.058361][T15165] should_failslab+0x5/0x20 [ 178.062918][T15165] kmem_cache_alloc_trace+0x52/0x320 [ 178.068343][T15165] audit_log_d_path+0x97/0x200 [ 178.073153][T15165] audit_log_d_path_exe+0x3e/0x70 [ 178.078173][T15165] audit_log_task+0x159/0x180 [ 178.082868][T15165] audit_seccomp+0x5e/0xf0 [ 178.087297][T15165] __seccomp_filter+0x515/0xe40 [ 178.092131][T15165] ? proc_fail_nth_write+0x127/0x150 [ 178.097408][T15165] ? vfs_write+0x61a/0x900 [ 178.101878][T15165] __secure_computing+0xfb/0x140 [ 178.106799][T15165] syscall_trace_enter+0x120/0x290 [ 178.111897][T15165] ? switch_fpu_return+0xa/0x10 [ 178.116727][T15165] ? exit_to_user_mode_prepare+0x65/0x190 [ 178.122439][T15165] syscall_enter_from_user_mode+0x1c/0x20 [ 178.128146][T15165] do_syscall_64+0x25/0xa0 [ 178.132554][T15165] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.138435][T15165] RIP: 0033:0x7f1af1b34a79 [ 178.142831][T15165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.162417][T15165] RSP: 002b:00007f1aef8ac188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 178.170865][T15165] RAX: ffffffffffffffda RBX: 00007f1af1c38f60 RCX: 00007f1af1b34a79 [ 178.178814][T15165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 178.186777][T15165] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 178.194727][T15165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.202787][T15165] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 [ 178.210796][T15175] CPU: 1 PID: 15175 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 178.219577][T15175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.223641][T15177] loop5: detected capacity change from 0 to 264192 [ 178.229712][T15175] Call Trace: [ 178.229721][T15175] dump_stack_lvl+0xd6/0x122 [ 178.229743][T15175] dump_stack+0x11/0x1b [ 178.248175][T15175] should_fail+0x23c/0x250 [ 178.252600][T15175] ? __es_insert_extent+0x51f/0xe70 [ 178.257877][T15175] __should_failslab+0x81/0x90 [ 178.262641][T15175] should_failslab+0x5/0x20 [ 178.267145][T15175] kmem_cache_alloc+0x4f/0x300 [ 178.271907][T15175] __es_insert_extent+0x51f/0xe70 [ 178.276996][T15175] ext4_es_insert_extent+0x1cb/0x1950 [ 178.282350][T15175] ? percpu_counter_add_batch+0x69/0xd0 [ 178.287973][T15175] ext4_map_blocks+0xa5d/0xf00 [ 178.292721][T15175] mpage_map_one_extent+0x10d/0x360 [ 178.298002][T15175] ext4_writepages+0xc5a/0x1d70 [ 178.302923][T15175] ? __brelse+0x2c/0x50 [ 178.307099][T15175] ? ext4_mark_iloc_dirty+0x161a/0x1700 [ 178.312630][T15175] ? ext4_dirty_inode+0x58/0xa0 [ 178.317509][T15175] ? __ext4_journal_stop+0x47/0x110 [ 178.322703][T15175] ? ext4_expand_extra_isize+0x560/0x560 [ 178.328350][T15175] ? ext4_dirty_inode+0x9a/0xa0 [ 178.333185][T15175] ? ext4_readpage+0x140/0x140 [ 178.338090][T15175] do_writepages+0x26b/0x3c0 [ 178.342714][T15175] ? generic_write_end+0x157/0x180 [ 178.347811][T15175] file_write_and_wait_range+0x1ae/0x240 [ 178.353507][T15175] ext4_sync_file+0x105/0x670 [ 178.358178][T15175] ? tsan.module_ctor+0x10/0x10 [ 178.363015][T15175] vfs_fsync_range+0x107/0x120 [ 178.367815][T15175] ext4_buffered_write_iter+0x3af/0x400 [ 178.373345][T15175] ext4_file_write_iter+0x2e7/0x11f0 [ 178.378616][T15175] ? get_page_from_freelist+0x55e/0x830 [ 178.384164][T15175] ? should_fail+0xd6/0x250 [ 178.388664][T15175] ? _copy_from_user+0x94/0xd0 [ 178.393586][T15175] do_iter_readv_writev+0x2de/0x380 [ 178.398825][T15175] do_iter_write+0x192/0x5c0 [ 178.403413][T15175] do_writev+0x210/0x440 [ 178.407641][T15175] ? vfs_write+0x61a/0x900 [ 178.412059][T15175] __x64_sys_writev+0x41/0x50 [ 178.416789][T15175] do_syscall_64+0x44/0xa0 [ 178.421234][T15175] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.427121][T15175] RIP: 0033:0x7fd3cbf4da79 [ 178.431523][T15175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.451126][T15175] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 178.459531][T15175] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 178.467494][T15175] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 178.475455][T15175] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 04:41:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 6) 04:41:46 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x1f000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:46 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) [ 178.483410][T15175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 178.491374][T15175] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 [ 178.554486][T15186] FAULT_INJECTION: forcing a failure. [ 178.554486][T15186] name failslab, interval 1, probability 0, space 0, times 0 [ 178.567242][T15186] CPU: 1 PID: 15186 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 178.577045][T15186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.587098][T15186] Call Trace: [ 178.590368][T15186] dump_stack_lvl+0xd6/0x122 [ 178.595032][T15186] dump_stack+0x11/0x1b [ 178.599236][T15186] should_fail+0x23c/0x250 [ 178.603641][T15186] ? audit_log_start+0x351/0x6b0 [ 178.608566][T15186] __should_failslab+0x81/0x90 [ 178.613364][T15186] should_failslab+0x5/0x20 [ 178.617852][T15186] kmem_cache_alloc+0x4f/0x300 [ 178.622599][T15186] audit_log_start+0x351/0x6b0 [ 178.627350][T15186] audit_seccomp+0x45/0xf0 [ 178.631835][T15186] __seccomp_filter+0x515/0xe40 [ 178.636668][T15186] ? seq_open+0xf0/0xf0 [ 178.640808][T15186] ? proc_reg_read+0x15a/0x1b0 [ 178.645555][T15186] ? proc_reg_get_unmapped_area+0x220/0x220 [ 178.651437][T15186] __secure_computing+0xfb/0x140 [ 178.656356][T15186] syscall_trace_enter+0x120/0x290 [ 178.661451][T15186] ? switch_fpu_return+0xa/0x10 [ 178.666279][T15186] ? exit_to_user_mode_prepare+0x65/0x190 [ 178.671983][T15186] syscall_enter_from_user_mode+0x1c/0x20 [ 178.677693][T15186] do_syscall_64+0x25/0xa0 [ 178.682175][T15186] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.688057][T15186] RIP: 0033:0x7f1af1ae762c [ 178.692510][T15186] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 178.712099][T15186] RSP: 002b:00007f1aef8ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 178.720531][T15186] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1af1ae762c [ 178.728515][T15186] RDX: 000000000000000f RSI: 00007f1aef8ac1e0 RDI: 0000000000000004 [ 178.736474][T15186] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 178.744480][T15186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 04:41:46 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x9}], 0x1) 04:41:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:46 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 13) 04:41:46 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 178.752432][T15186] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 [ 178.797294][T15197] FAULT_INJECTION: forcing a failure. [ 178.797294][T15197] name failslab, interval 1, probability 0, space 0, times 0 [ 178.809954][T15197] CPU: 1 PID: 15197 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 178.818785][T15197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.828885][T15197] Call Trace: [ 178.832152][T15197] dump_stack_lvl+0xd6/0x122 [ 178.836731][T15197] dump_stack+0x11/0x1b [ 178.840870][T15197] should_fail+0x23c/0x250 [ 178.845268][T15197] ? mempool_alloc_slab+0x16/0x20 [ 178.850272][T15197] __should_failslab+0x81/0x90 [ 178.855017][T15197] should_failslab+0x5/0x20 [ 178.859501][T15197] kmem_cache_alloc+0x4f/0x300 [ 178.864243][T15197] mempool_alloc_slab+0x16/0x20 [ 178.869072][T15197] ? mempool_free+0x130/0x130 [ 178.873727][T15197] mempool_alloc+0x9d/0x310 [ 178.878211][T15197] bio_alloc_bioset+0xcc/0x530 [ 178.882958][T15197] ext4_bio_write_page+0x7c5/0xa40 [ 178.888053][T15197] ext4_writepages+0x10a0/0x1d70 [ 178.892979][T15197] ? ext4_readpage+0x140/0x140 [ 178.897800][T15197] do_writepages+0x26b/0x3c0 [ 178.902401][T15197] ? generic_write_end+0x157/0x180 [ 178.907507][T15197] file_write_and_wait_range+0x1ae/0x240 [ 178.913127][T15197] ext4_sync_file+0x105/0x670 [ 178.917790][T15197] ? tsan.module_ctor+0x10/0x10 [ 178.922624][T15197] vfs_fsync_range+0x107/0x120 [ 178.927372][T15197] ext4_buffered_write_iter+0x3af/0x400 [ 178.932914][T15197] ext4_file_write_iter+0x2e7/0x11f0 [ 178.938182][T15197] ? get_page_from_freelist+0x55e/0x830 [ 178.943712][T15197] ? should_fail+0xd6/0x250 [ 178.948222][T15197] ? _copy_from_user+0x94/0xd0 [ 178.952970][T15197] do_iter_readv_writev+0x2de/0x380 [ 178.958155][T15197] do_iter_write+0x192/0x5c0 [ 178.962806][T15197] do_writev+0x210/0x440 [ 178.967034][T15197] ? vfs_write+0x61a/0x900 [ 178.971492][T15197] __x64_sys_writev+0x41/0x50 [ 178.976157][T15197] do_syscall_64+0x44/0xa0 [ 178.980563][T15197] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 178.986445][T15197] RIP: 0033:0x7fd3cbf4da79 [ 178.990841][T15197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.010430][T15197] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 179.018823][T15197] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 179.026782][T15197] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 179.034735][T15197] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 04:41:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 7) [ 179.042871][T15197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 179.050917][T15197] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 [ 179.082717][T15210] loop5: detected capacity change from 0 to 264192 04:41:46 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xa}], 0x1) [ 179.101523][T15212] FAULT_INJECTION: forcing a failure. [ 179.101523][T15212] name failslab, interval 1, probability 0, space 0, times 0 [ 179.114174][T15212] CPU: 1 PID: 15212 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 179.122931][T15212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.132983][T15212] Call Trace: [ 179.136262][T15212] dump_stack_lvl+0xd6/0x122 [ 179.140930][T15212] dump_stack+0x11/0x1b [ 179.145086][T15212] should_fail+0x23c/0x250 04:41:46 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 179.149499][T15212] __should_failslab+0x81/0x90 [ 179.154261][T15212] should_failslab+0x5/0x20 [ 179.158766][T15212] kmem_cache_alloc_node+0x61/0x2c0 [ 179.163954][T15212] ? should_fail+0xd6/0x250 [ 179.168450][T15212] ? __alloc_skb+0xed/0x420 [ 179.172953][T15212] __alloc_skb+0xed/0x420 [ 179.177312][T15212] audit_log_start+0x36d/0x6b0 [ 179.182081][T15212] audit_seccomp+0x45/0xf0 [ 179.186535][T15212] __seccomp_filter+0x515/0xe40 [ 179.191382][T15212] ? seq_open+0xf0/0xf0 [ 179.195556][T15212] ? proc_reg_read+0x15a/0x1b0 [ 179.200320][T15212] ? proc_reg_get_unmapped_area+0x220/0x220 [ 179.206260][T15212] __secure_computing+0xfb/0x140 [ 179.211196][T15212] syscall_trace_enter+0x120/0x290 [ 179.216438][T15212] ? exit_to_user_mode_prepare+0x65/0x190 [ 179.222199][T15212] syscall_enter_from_user_mode+0x1c/0x20 [ 179.227996][T15212] do_syscall_64+0x25/0xa0 [ 179.232530][T15212] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 179.238522][T15212] RIP: 0033:0x7f1af1ae762c [ 179.242918][T15212] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 179.262508][T15212] RSP: 002b:00007f1aef8ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 179.270899][T15212] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1af1ae762c [ 179.278870][T15212] RDX: 000000000000000f RSI: 00007f1aef8ac1e0 RDI: 0000000000000004 [ 179.286822][T15212] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 04:41:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 8) 04:41:46 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 14) [ 179.294770][T15212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.302724][T15212] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 [ 179.360932][T15229] FAULT_INJECTION: forcing a failure. [ 179.360932][T15229] name failslab, interval 1, probability 0, space 0, times 0 [ 179.373673][T15229] CPU: 0 PID: 15229 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 179.375564][T15235] loop5: detected capacity change from 0 to 264192 [ 179.382463][T15229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.382476][T15229] Call Trace: [ 179.382483][T15229] dump_stack_lvl+0xd6/0x122 [ 179.382507][T15229] dump_stack+0x11/0x1b [ 179.410988][T15229] should_fail+0x23c/0x250 [ 179.415538][T15229] __should_failslab+0x81/0x90 [ 179.420287][T15229] should_failslab+0x5/0x20 [ 179.424776][T15229] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 179.430563][T15229] ? __kmalloc_node_track_caller+0x30/0x40 [ 179.436353][T15229] __kmalloc_node_track_caller+0x30/0x40 [ 179.441969][T15229] ? audit_log_start+0x36d/0x6b0 [ 179.446903][T15229] __alloc_skb+0x187/0x420 [ 179.451311][T15229] audit_log_start+0x36d/0x6b0 [ 179.456057][T15229] audit_seccomp+0x45/0xf0 [ 179.460480][T15229] __seccomp_filter+0x515/0xe40 [ 179.465313][T15229] ? seq_open+0xf0/0xf0 [ 179.469455][T15229] ? proc_reg_read+0x15a/0x1b0 [ 179.474241][T15229] ? proc_reg_get_unmapped_area+0x220/0x220 [ 179.480128][T15229] __secure_computing+0xfb/0x140 [ 179.485089][T15229] syscall_trace_enter+0x120/0x290 [ 179.490203][T15229] ? switch_fpu_return+0xa/0x10 [ 179.495033][T15229] ? exit_to_user_mode_prepare+0x65/0x190 [ 179.500739][T15229] syscall_enter_from_user_mode+0x1c/0x20 [ 179.506541][T15229] do_syscall_64+0x25/0xa0 [ 179.510946][T15229] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 179.516901][T15229] RIP: 0033:0x7f1af1ae762c [ 179.521311][T15229] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 179.540989][T15229] RSP: 002b:00007f1aef8ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 179.549471][T15229] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1af1ae762c 04:41:47 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xb}], 0x1) 04:41:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) [ 179.557436][T15229] RDX: 000000000000000f RSI: 00007f1aef8ac1e0 RDI: 0000000000000004 [ 179.565391][T15229] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 179.573363][T15229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.581755][T15229] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 [ 179.626547][T15234] FAULT_INJECTION: forcing a failure. [ 179.626547][T15234] name failslab, interval 1, probability 0, space 0, times 0 [ 179.639375][T15234] CPU: 1 PID: 15234 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 179.648202][T15234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.658251][T15234] Call Trace: [ 179.661574][T15234] dump_stack_lvl+0xd6/0x122 [ 179.666223][T15234] dump_stack+0x11/0x1b [ 179.670379][T15234] should_fail+0x23c/0x250 [ 179.674792][T15234] ? mempool_alloc_slab+0x16/0x20 [ 179.679811][T15234] __should_failslab+0x81/0x90 [ 179.684575][T15234] should_failslab+0x5/0x20 [ 179.689073][T15234] kmem_cache_alloc+0x4f/0x300 [ 179.693818][T15234] ? mempool_alloc_slab+0x16/0x20 [ 179.698869][T15234] mempool_alloc_slab+0x16/0x20 [ 179.703766][T15234] ? mempool_free+0x130/0x130 [ 179.708422][T15234] mempool_alloc+0x9d/0x310 [ 179.712906][T15234] bio_alloc_bioset+0x1af/0x530 [ 179.717738][T15234] ext4_bio_write_page+0x7c5/0xa40 [ 179.722885][T15234] ext4_writepages+0x10a0/0x1d70 [ 179.727928][T15234] ? ext4_readpage+0x140/0x140 [ 179.732703][T15234] do_writepages+0x26b/0x3c0 [ 179.737275][T15234] ? generic_write_end+0x157/0x180 [ 179.742410][T15234] file_write_and_wait_range+0x1ae/0x240 [ 179.748045][T15234] ext4_sync_file+0x105/0x670 [ 179.752703][T15234] ? tsan.module_ctor+0x10/0x10 [ 179.757535][T15234] vfs_fsync_range+0x107/0x120 [ 179.762290][T15234] ext4_buffered_write_iter+0x3af/0x400 [ 179.767818][T15234] ext4_file_write_iter+0x2e7/0x11f0 [ 179.773088][T15234] ? get_page_from_freelist+0x55e/0x830 [ 179.778618][T15234] ? should_fail+0xd6/0x250 [ 179.783108][T15234] ? _copy_from_user+0x94/0xd0 [ 179.787852][T15234] do_iter_readv_writev+0x2de/0x380 [ 179.793102][T15234] do_iter_write+0x192/0x5c0 [ 179.797765][T15234] do_writev+0x210/0x440 [ 179.801991][T15234] ? vfs_write+0x61a/0x900 [ 179.806390][T15234] __x64_sys_writev+0x41/0x50 [ 179.811058][T15234] do_syscall_64+0x44/0xa0 [ 179.815460][T15234] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 179.821362][T15234] RIP: 0033:0x7fd3cbf4da79 [ 179.825758][T15234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.845359][T15234] RSP: 002b:00007fd3c9cc5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 179.853817][T15234] RAX: ffffffffffffffda RBX: 00007fd3cc051f60 RCX: 00007fd3cbf4da79 [ 179.861769][T15234] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 179.869734][T15234] RBP: 00007fd3c9cc51d0 R08: 0000000000000000 R09: 0000000000000000 04:41:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 9) 04:41:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) 04:41:47 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x22000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 179.877684][T15234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 179.885864][T15234] R13: 00007ffdcf3dfabf R14: 00007fd3c9cc5300 R15: 0000000000022000 [ 179.930282][T15254] FAULT_INJECTION: forcing a failure. [ 179.930282][T15254] name failslab, interval 1, probability 0, space 0, times 0 [ 179.942921][T15254] CPU: 0 PID: 15254 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 179.951760][T15254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.961798][T15254] Call Trace: [ 179.965071][T15254] dump_stack_lvl+0xd6/0x122 [ 179.969656][T15254] dump_stack+0x11/0x1b [ 179.973794][T15254] should_fail+0x23c/0x250 [ 179.978234][T15254] ? sidtab_sid2str_get+0x9c/0x130 [ 179.983352][T15254] __should_failslab+0x81/0x90 [ 179.988162][T15254] should_failslab+0x5/0x20 [ 179.992658][T15254] __kmalloc_track_caller+0x6d/0x350 [ 179.997925][T15254] ? vsnprintf+0xe8f/0xed0 [ 180.002322][T15254] kmemdup+0x21/0x50 [ 180.006202][T15254] sidtab_sid2str_get+0x9c/0x130 [ 180.011151][T15254] security_sid_to_context_core+0x1cb/0x2d0 [ 180.017071][T15254] security_sid_to_context+0x2c/0x40 [ 180.022341][T15254] selinux_secid_to_secctx+0x25/0x30 [ 180.027607][T15254] security_secid_to_secctx+0x45/0xa0 [ 180.033038][T15254] audit_log_task_context+0x91/0x1c0 [ 180.038377][T15254] audit_log_task+0xfd/0x180 [ 180.042950][T15254] audit_seccomp+0x5e/0xf0 [ 180.047357][T15254] __seccomp_filter+0x515/0xe40 [ 180.052341][T15254] ? seq_open+0xf0/0xf0 [ 180.056485][T15254] ? proc_reg_read+0x15a/0x1b0 [ 180.061233][T15254] ? proc_reg_get_unmapped_area+0x220/0x220 [ 180.067130][T15254] __secure_computing+0xfb/0x140 [ 180.072052][T15254] syscall_trace_enter+0x120/0x290 [ 180.077149][T15254] ? exit_to_user_mode_prepare+0x65/0x190 [ 180.082851][T15254] syscall_enter_from_user_mode+0x1c/0x20 [ 180.088571][T15254] do_syscall_64+0x25/0xa0 [ 180.092980][T15254] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 180.098890][T15254] RIP: 0033:0x7f1af1ae762c [ 180.103362][T15254] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 180.122948][T15254] RSP: 002b:00007f1aef8ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 180.131340][T15254] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1af1ae762c [ 180.139294][T15254] RDX: 000000000000000f RSI: 00007f1aef8ac1e0 RDI: 0000000000000004 [ 180.147252][T15254] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 180.155206][T15254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.163159][T15254] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 [ 180.171170][T15254] audit_panic: 189 callbacks suppressed 04:41:47 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xc}], 0x1) [ 180.171180][T15254] audit: error in audit_log_task_context [ 180.199171][ T22] audit: type=1326 audit(1634100107.501:2479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15253 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 180.224918][ T22] audit: type=1326 audit(1634100107.501:2480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15253 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f1af1ae758f code=0x7ffc0000 04:41:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:47 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xd}], 0x1) [ 180.266344][ T22] audit: type=1326 audit(1634100107.501:2481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15253 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 180.291922][ T22] audit: type=1326 audit(1634100107.751:2483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15252 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 180.324667][T15269] loop5: detected capacity change from 0 to 264192 04:41:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 10) 04:41:47 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) [ 180.332391][ T22] audit: type=1326 audit(1634100107.751:2484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15252 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1559deb994 code=0x7ffc0000 [ 180.374993][T15282] FAULT_INJECTION: forcing a failure. [ 180.374993][T15282] name failslab, interval 1, probability 0, space 0, times 0 [ 180.387625][T15282] CPU: 0 PID: 15282 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 180.396380][T15282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.406427][T15282] Call Trace: [ 180.409700][T15282] dump_stack_lvl+0xd6/0x122 [ 180.414320][T15282] dump_stack+0x11/0x1b [ 180.418471][T15282] should_fail+0x23c/0x250 04:41:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x25000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 180.422960][T15282] __should_failslab+0x81/0x90 [ 180.427721][T15282] ? audit_log_d_path+0x97/0x200 [ 180.432669][T15282] should_failslab+0x5/0x20 [ 180.432896][ T22] audit: type=1326 audit(1634100107.751:2485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15252 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1559deb994 code=0x7ffc0000 [ 180.437169][T15282] kmem_cache_alloc_trace+0x52/0x320 [ 180.437190][T15282] audit_log_d_path+0x97/0x200 [ 180.464158][ T22] audit: type=1326 audit(1634100107.751:2486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15252 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 180.467007][T15282] audit_log_d_path_exe+0x3e/0x70 [ 180.467036][T15282] audit_log_task+0x159/0x180 04:41:48 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x2}], 0x1) [ 180.475160][ T22] audit: type=1326 audit(1634100107.761:2487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15252 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 180.496390][T15282] audit_seccomp+0x5e/0xf0 [ 180.496412][T15282] __seccomp_filter+0x515/0xe40 [ 180.496432][T15282] ? seq_open+0xf0/0xf0 [ 180.543993][T15282] ? proc_reg_read+0x15a/0x1b0 [ 180.548752][T15282] ? proc_reg_get_unmapped_area+0x220/0x220 [ 180.554653][T15282] __secure_computing+0xfb/0x140 [ 180.559595][T15282] syscall_trace_enter+0x120/0x290 [ 180.564706][T15282] ? exit_to_user_mode_prepare+0x65/0x190 [ 180.570487][T15282] syscall_enter_from_user_mode+0x1c/0x20 [ 180.576205][T15282] do_syscall_64+0x25/0xa0 [ 180.577086][ T22] audit: type=1326 audit(1634100107.761:2488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15252 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1559e38a79 code=0x7ffc0000 [ 180.580683][T15282] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 180.611144][T15282] RIP: 0033:0x7f1af1ae762c 04:41:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/232, 0xe8) 04:41:48 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xf}], 0x1) [ 180.615548][T15282] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 180.635153][T15282] RSP: 002b:00007f1aef8ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 180.643563][T15282] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1af1ae762c [ 180.651576][T15282] RDX: 000000000000000f RSI: 00007f1aef8ac1e0 RDI: 0000000000000004 [ 180.659542][T15282] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 180.667505][T15282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 180.675474][T15282] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 [ 180.742047][T15317] loop5: detected capacity change from 0 to 264192 04:41:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/232, 0xe8) 04:41:48 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x3}], 0x1) 04:41:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) (fail_nth: 11) 04:41:48 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x10}], 0x1) 04:41:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x34030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 180.843752][T15332] FAULT_INJECTION: forcing a failure. [ 180.843752][T15332] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.845999][T15333] loop5: detected capacity change from 0 to 264192 [ 180.857030][T15332] CPU: 1 PID: 15332 Comm: syz-executor.1 Not tainted 5.15.0-rc5-syzkaller #0 [ 180.872231][T15332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.882277][T15332] Call Trace: [ 180.885549][T15332] dump_stack_lvl+0xd6/0x122 [ 180.890143][T15332] dump_stack+0x11/0x1b [ 180.894291][T15332] should_fail+0x23c/0x250 [ 180.898708][T15332] should_fail_usercopy+0x16/0x20 [ 180.903724][T15332] _copy_to_user+0x1c/0x90 [ 180.908144][T15332] simple_read_from_buffer+0xab/0x120 [ 180.913532][T15332] proc_fail_nth_read+0x10d/0x150 [ 180.918609][T15332] ? proc_fault_inject_write+0x230/0x230 [ 180.924247][T15332] vfs_read+0x1e6/0x750 [ 180.928392][T15332] ? __schedule+0x435/0x680 [ 180.932877][T15332] ? __cond_resched+0x2a/0x40 [ 180.937535][T15332] ksys_read+0xd9/0x190 [ 180.941681][T15332] __x64_sys_read+0x3e/0x50 [ 180.946210][T15332] do_syscall_64+0x44/0xa0 [ 180.950614][T15332] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 180.956492][T15332] RIP: 0033:0x7f1af1ae762c [ 180.960889][T15332] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 180.980530][T15332] RSP: 002b:00007f1aef8ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 04:41:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x0, 0x0) 04:41:48 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x11}], 0x1) [ 180.989016][T15332] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1af1ae762c [ 180.997032][T15332] RDX: 000000000000000f RSI: 00007f1aef8ac1e0 RDI: 0000000000000004 [ 181.004984][T15332] RBP: 00007f1aef8ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 181.012937][T15332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 181.020888][T15332] R13: 00007ffcc3634faf R14: 00007f1aef8ac300 R15: 0000000000022000 04:41:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/232, 0xe8) 04:41:48 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x4}], 0x1) 04:41:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) [ 181.111641][T15361] loop5: detected capacity change from 0 to 264192 04:41:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x2, 0x0) 04:41:48 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x5}], 0x1) 04:41:48 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x112}], 0x1) 04:41:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) 04:41:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x3, 0x0) 04:41:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:48 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x6}], 0x1) 04:41:48 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x300}], 0x1) [ 181.259334][T15396] loop5: detected capacity change from 0 to 264192 04:41:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x4, 0x0) 04:41:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) 04:41:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:48 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x7}], 0x1) 04:41:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:49 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xd00}], 0x1) 04:41:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x5, 0x0) [ 181.410721][T15432] loop5: detected capacity change from 0 to 264192 04:41:49 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:49 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x8}], 0x1) 04:41:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x6, 0x0) 04:41:49 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xe00}], 0x1) [ 181.531817][T15459] loop5: detected capacity change from 0 to 264192 04:41:49 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x9}], 0x1) 04:41:49 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x60000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:49 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x7, 0x0) 04:41:49 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xf00}], 0x1) 04:41:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 181.671340][T15480] loop5: detected capacity change from 0 to 264192 04:41:49 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xa}], 0x1) 04:41:49 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) 04:41:49 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x8, 0x0) 04:41:49 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xb}], 0x1) 04:41:49 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1001}], 0x1) 04:41:49 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x9, 0x0) 04:41:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:49 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1100}], 0x1) [ 181.888667][T15539] loop5: detected capacity change from 0 to 264192 04:41:49 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:49 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xc}], 0x1) 04:41:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xa, 0x0) [ 182.049623][T15566] loop5: detected capacity change from 0 to 264192 04:41:50 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:50 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:50 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1200}], 0x1) 04:41:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xb, 0x0) 04:41:50 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xd}], 0x1) 04:41:50 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x78000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xc, 0x0) 04:41:50 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xf}], 0x1) [ 182.685347][T15593] loop5: detected capacity change from 0 to 264192 04:41:50 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xd, 0x0) 04:41:50 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:50 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x8200}], 0x1) 04:41:50 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') unshare(0x40040400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ftruncate(r1, 0x2007fff) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xe, 0x0) 04:41:50 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x10}], 0x1) 04:41:50 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x8400}], 0x1) [ 182.844880][T15637] loop5: detected capacity change from 0 to 264192 04:41:50 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x11}], 0x1) 04:41:50 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x83030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x10, 0x0) 04:41:50 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='c-!\\,)\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:50 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x8600}], 0x1) 04:41:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x11, 0x0) 04:41:50 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 182.973891][T15665] loop5: detected capacity change from 0 to 264192 04:41:50 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x85ffffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 183.095675][T15689] loop5: detected capacity change from 0 to 264192 04:41:51 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) (fail_nth: 1) 04:41:51 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x14e}], 0x1) 04:41:51 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x12, 0x0) 04:41:51 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xfdef}], 0x1) 04:41:51 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x88030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x25, 0x0) [ 183.758928][T15707] loop5: detected capacity change from 0 to 264192 04:41:51 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:51 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x8800000}], 0x1) 04:41:51 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x300}], 0x1) 04:41:51 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x48, 0x0) [ 183.909587][T15729] loop5: detected capacity change from 0 to 264192 [ 184.609424][T15709] FAULT_INJECTION: forcing a failure. [ 184.609424][T15709] name fail_futex, interval 1, probability 0, space 0, times 1 [ 184.622204][T15709] CPU: 1 PID: 15709 Comm: syz-executor.3 Not tainted 5.15.0-rc5-syzkaller #0 [ 184.630960][T15709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.640989][T15709] Call Trace: [ 184.644280][T15709] dump_stack_lvl+0xd6/0x122 [ 184.648849][T15709] dump_stack+0x11/0x1b [ 184.652981][T15709] should_fail+0x23c/0x250 [ 184.657375][T15709] get_futex_key+0xee/0x840 [ 184.661861][T15709] futex_wake+0x89/0x3f0 [ 184.666250][T15709] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 184.672063][T15709] do_futex+0x9b0/0x2050 [ 184.676282][T15709] ? perf_swevent_event+0x99/0x3d0 [ 184.681377][T15709] ? perf_trace_buf_update+0xa4/0xd0 [ 184.686704][T15709] ? perf_tp_event+0x4dd/0x510 [ 184.691517][T15709] ? locks_remove_posix+0x19d/0x290 [ 184.696689][T15709] ? __down_read_common+0x17e/0x540 [ 184.701864][T15709] ? snd_seq_deliver_event+0x472/0x4b0 [ 184.707422][T15709] ? locks_remove_file+0x846/0x8d0 [ 184.712508][T15709] ? futex_cleanup+0x7e/0xaa0 [ 184.717159][T15709] ? uprobe_free_utask+0x1be/0x2a0 [ 184.722319][T15709] mm_release+0x129/0x210 [ 184.726626][T15709] exit_mm_release+0x21/0x30 [ 184.731192][T15709] exit_mm+0x4b/0x3e0 [ 184.735148][T15709] ? taskstats_exit+0x373/0x6d0 [ 184.740022][T15709] do_exit+0x3ef/0x14a0 [ 184.744153][T15709] do_group_exit+0xce/0x1a0 [ 184.748633][T15709] get_signal+0xf93/0x15d0 [ 184.753056][T15709] ? snd_seq_info_dump_subscribers+0x2a0/0x2a0 [ 184.759190][T15709] ? vfs_read+0x4e3/0x750 [ 184.763506][T15709] arch_do_signal_or_restart+0x8c/0x280 [ 184.769027][T15709] exit_to_user_mode_prepare+0x109/0x190 [ 184.774672][T15709] syscall_exit_to_user_mode+0x20/0x40 [ 184.780106][T15709] do_syscall_64+0x50/0xa0 [ 184.784517][T15709] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.790443][T15709] RIP: 0033:0x7f0bca188a79 [ 184.794831][T15709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.814408][T15709] RSP: 002b:00007f0bc7f00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 184.822794][T15709] RAX: fffffffffffffe00 RBX: 00007f0bca28cf60 RCX: 00007f0bca188a79 [ 184.830743][T15709] RDX: 00000000000000e8 RSI: 0000000020000080 RDI: 0000000000000004 [ 184.838698][T15709] RBP: 00007f0bc7f001d0 R08: 0000000000000000 R09: 0000000000000000 [ 184.846647][T15709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 04:41:52 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:52 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x600}], 0x1) 04:41:52 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa3030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x4c, 0x0) 04:41:52 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x20000201}], 0x1) [ 184.854631][T15709] R13: 00007ffc9d913dff R14: 00007f0bc7f00300 R15: 0000000000022000 04:41:52 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x700}], 0x1) 04:41:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 184.901037][T15759] loop5: detected capacity change from 0 to 264192 04:41:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x68, 0x0) 04:41:52 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa4030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x6c, 0x0) [ 185.064863][T15790] loop5: detected capacity change from 0 to 264192 04:41:53 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0x1b) 04:41:53 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1001}], 0x1) 04:41:53 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:53 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa5030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x74, 0x0) 04:41:53 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x7ffff000}], 0x1) [ 185.798704][ T22] kauditd_printk_skb: 646 callbacks suppressed [ 185.798715][ T22] audit: type=1326 audit(1634100113.361:3134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 04:41:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x7a, 0x0) [ 185.852880][T15814] loop5: detected capacity change from 0 to 264192 04:41:53 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0x20000168) [ 185.880912][ T22] audit: type=1326 audit(1634100113.361:3135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 04:41:53 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa6030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:53 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x2e00}], 0x1) 04:41:53 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x300, 0x0) 04:41:53 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x2f00}], 0x1) 04:41:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x500, 0x0) [ 186.007350][ T22] audit: type=1326 audit(1634100113.361:3136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 04:41:53 executing program 0: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 186.072355][T15849] loop5: detected capacity change from 0 to 264192 04:41:53 executing program 0: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x600, 0x0) [ 186.161303][ T22] audit: type=1326 audit(1634100113.371:3137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 186.189859][ T22] audit: type=1326 audit(1634100113.371:3138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 186.218330][ T22] audit: type=1326 audit(1634100113.371:3139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 186.244959][ T22] audit: type=1326 audit(1634100113.371:3140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 186.279725][ T22] audit: type=1326 audit(1634100113.371:3141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 186.309922][ T22] audit: type=1326 audit(1634100113.371:3142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 186.344274][ T22] audit: type=1326 audit(1634100113.371:3143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15804 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 04:41:53 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffff8001}], 0x1) 04:41:53 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa7030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 186.427595][T15876] loop5: detected capacity change from 0 to 264192 04:41:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0x7ffff000) 04:41:54 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x3000}], 0x1) 04:41:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x700, 0x0) 04:41:54 executing program 0: rseq(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:54 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa8030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:54 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xfffffdef}], 0x1) 04:41:54 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xa9030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:54 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(0x0, 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 186.909233][T15899] loop5: detected capacity change from 0 to 264192 04:41:54 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x8500}], 0x1) 04:41:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x900, 0x0) 04:41:54 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(0x0, 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xa00, 0x0) [ 187.057814][T15930] loop5: detected capacity change from 0 to 264192 04:41:55 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(0x0, 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:55 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xb900}], 0x1) 04:41:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xffffffffffffffff) 04:41:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xb00, 0x0) 04:41:55 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xaa030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:55 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffffffff000}], 0x1) 04:41:55 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xc00, 0x0) 04:41:55 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xab030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 187.830576][T15960] loop5: detected capacity change from 0 to 264192 04:41:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40081}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000240)={0x0, 0x81}) read(r1, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000380)={0x0, @time={0x7f, 0x200}, 0x1, {0x6, 0x3f}, 0xbe, 0x0, 0x8}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000300)) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:55 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xfdef}], 0x1) 04:41:55 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xd00, 0x0) 04:41:55 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xac030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 187.951053][T15977] loop5: detected capacity change from 0 to 264192 04:41:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xe00, 0x0) 04:41:55 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x8800000}], 0x1) 04:41:55 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 188.066378][T16006] loop5: detected capacity change from 0 to 264192 04:41:55 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x7ffffffffffff}], 0x1) 04:41:55 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:55 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xad030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x1100, 0x0) [ 188.434046][T16022] loop5: detected capacity change from 0 to 264192 04:41:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x7, 0x7f, 0xf, 0x42, 0x0, 0x0, 0x28008, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x9}, 0x1, 0x8, 0x5, 0xb, 0x4c4, 0xbd6, 0x20, 0x0, 0x7fe, 0x0, 0x40}, 0x0, 0x3, 0xffffffffffffffff, 0xa) r1 = fsmount(0xffffffffffffffff, 0x0, 0x2) write$sndseq(r1, &(0x7f0000000240)=[{0x1, 0x7, 0x4, 0x1f, @time={0x3ea9, 0x1}, {0x40, 0x4}, {0x7, 0x4}, @queue={0x6, {0x80000001, 0x860}}}, {0x7, 0x6, 0xf7, 0x0, @tick=0xe3, {}, {0x6, 0x77}, @time=@time={0x5, 0x1}}, {0x0, 0x9, 0x3, 0xe, @time={0x4, 0x7}, {0x9, 0xfd}, {0xff}, @addr={0x5, 0x2}}], 0x54) write$sndseq(r0, &(0x7f0000000200)=[{0x0, 0x73, 0x40, 0x80, @time={0x4, 0x3f}, {0x92, 0xff}, {0x0, 0x80}, @raw8={"b1861d9c5e1be3033f49c0ba"}}], 0x1c) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:41:56 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x20000201}], 0x1) 04:41:56 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x1200, 0x0) 04:41:56 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xae030000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:56 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffff8881029034e8}], 0x1) 04:41:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x2500, 0x0) 04:41:56 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffff888102903c68}], 0x1) 04:41:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x4000, 0x0) 04:41:56 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}, {&(0x7f00000003c0)="369fd896ffd4fe902b7bfacdd2372b6686e8c0be6ceccc36bfce", 0x1a}], 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 188.919736][T16061] loop5: detected capacity change from 0 to 264192 04:41:56 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffff8881029043e8}], 0x1) 04:41:56 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:57 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:57 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xbc260000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:57 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xfffffffffffffdef}], 0x1) 04:41:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x4800, 0x0) 04:41:57 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r1, 0x1000, 0x10000, 0x7}) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000300)) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc0105303, &(0x7f0000000280)={{0x0, 0x8}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000180)={0x103, @time={0x8, 0x200}, 0xb2, {0x3, 0x81}, 0x7, 0x2, 0xc0}) 04:41:57 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x7ffff000}], 0x1) 04:41:57 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffffffffffffffff}], 0x1) 04:41:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x4c00, 0x0) 04:41:57 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 189.810981][T16111] loop5: detected capacity change from 0 to 264192 04:41:57 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:57 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x2) 04:41:57 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}, {&(0x7f0000000080)="2190630e807e6c1a719f99d001ce17fa4fbb", 0x12}], 0x3) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x6800, 0x0) 04:41:57 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x3) [ 189.943497][T16136] loop5: detected capacity change from 0 to 264192 04:41:57 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}, {&(0x7f00000002c0)="c61696dabb0ae00efd7db18ed39b7014710141c747b01a6c5e32fe8dab798412a99f91030bc52859de98a1fc3962ffbb30ef1923e09226053b68134b4234101ebf8f19b261aad6b91640325bef7f3aef1de4494c7e759a5bf5dee47b68f30f637d46f900153e65140670dc2daeae95303fde8716abcd52f4a69ee574360770b250d142582cac22e8ab7c0b4b73552ebb921981e50f3d60d78dce9dcd5da7348f21e0762fb828d00a95555e50fbfed72819d8930bf69f639dfd04685d6062e87c607f9487c884934a86d864f64ea26c4b189435ce08c9fbb2", 0xd8}], 0x2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x6c00, 0x0) [ 190.172450][ T1411] ================================================================== [ 190.180542][ T1411] BUG: KCSAN: data-race in __wb_update_bandwidth / percpu_counter_add_batch [ 190.189224][ T1411] [ 190.191535][ T1411] write to 0xffff8881028b3d40 of 8 bytes by task 9677 on cpu 1: [ 190.199141][ T1411] percpu_counter_add_batch+0x9c/0xd0 [ 190.204500][ T1411] test_clear_page_writeback+0x37c/0x600 [ 190.210114][ T1411] end_page_writeback+0xd7/0x1b0 [ 190.215037][ T1411] ext4_finish_bio+0x3e2/0x430 [ 190.219783][ T1411] ext4_release_io_end+0x98/0x200 [ 190.224791][ T1411] ext4_end_io_rsv_work+0x306/0x360 [ 190.229968][ T1411] process_one_work+0x402/0x910 [ 190.234795][ T1411] worker_thread+0x636/0xae0 [ 190.239368][ T1411] kthread+0x262/0x280 [ 190.243420][ T1411] ret_from_fork+0x1f/0x30 [ 190.247814][ T1411] [ 190.250153][ T1411] read to 0xffff8881028b3d40 of 8 bytes by task 1411 on cpu 0: [ 190.257665][ T1411] __wb_update_bandwidth+0x9f/0x470 [ 190.262841][ T1411] wb_update_bandwidth+0x46/0x70 [ 190.267754][ T1411] wb_update_bandwidth_workfn+0x18/0x20 [ 190.273274][ T1411] process_one_work+0x402/0x910 [ 190.278102][ T1411] worker_thread+0x636/0xae0 [ 190.282778][ T1411] kthread+0x262/0x280 [ 190.286831][ T1411] ret_from_fork+0x1f/0x30 [ 190.291224][ T1411] [ 190.293523][ T1411] value changed: 0x0000000000018c70 -> 0x0000000000018c80 [ 190.300601][ T1411] [ 190.302900][ T1411] Reported by Kernel Concurrency Sanitizer on: [ 190.309282][ T1411] CPU: 0 PID: 1411 Comm: kworker/u4:7 Not tainted 5.15.0-rc5-syzkaller #0 04:41:57 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x1, 0xffffbbe9, 0x0, 'queue0\x00', 0x4}) [ 190.317765][ T1411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.327797][ T1411] Workqueue: writeback wb_update_bandwidth_workfn [ 190.334187][ T1411] ================================================================== 04:41:58 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xca000000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x7400, 0x0) 04:41:58 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc569fc36217cac93f8f0bf8d724eede0bd54bbffb8e031dfdca2e315d2d7c5563e138f9426f9b0663d2023e3ee55bfcaf7eca7a5f353fc2a6a085a6caa4255fe0ad7c6240d017f0a6814317249afa8fbc4e4ed", 0xa5}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:58 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffff8001}], 0x1) 04:41:58 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x4) 04:41:58 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x7a00, 0x0) [ 190.478345][T16179] loop5: detected capacity change from 0 to 264192 04:41:58 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x5) 04:41:58 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xdaffffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xf0ff7f, 0x0) 04:41:58 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 190.631380][T16206] loop5: detected capacity change from 0 to 264192 04:41:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='cmdline\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffff7ffdffffffff, r0, 0x0) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x16c, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_DATA={0x38, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x2}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz1\x00'}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x6}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x4c, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x29e}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x84, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1}}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x4a3d}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1}}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz1\x00'}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}]}, @IPSET_ATTR_DATA={0x30, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x7fffffff}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xff}, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x80000001}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x20004001}, 0x2000c880) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xc9, 0xb3, 0x80, 0x2, 0x0, 0x1000000, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x2, @perf_bp={&(0x7f0000000040), 0x7}, 0x3c04, 0xff, 0xfffffffd, 0x4, 0x0, 0xd05, 0x7, 0x0, 0x4, 0x0, 0x9}, 0xffffffffffffffff, 0x10000000b, 0xffffffffffffffff, 0xa) read(r1, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000480)={0x0, @tick=0x5, 0x80, {0x0, 0x89}, 0x1, 0x2, 0x5}) 04:41:58 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x6) 04:41:58 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x1000000, 0x0) 04:41:58 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xe5ffffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:58 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xfffffdef}], 0x1) 04:41:58 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 191.347692][ T22] kauditd_printk_skb: 287 callbacks suppressed [ 191.347703][ T22] audit: type=1326 audit(1634100118.912:3431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 191.364009][T16233] loop5: detected capacity change from 0 to 264192 04:41:59 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x7) 04:41:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x2000000, 0x0) 04:41:59 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xf0ffffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 191.459173][ T22] audit: type=1326 audit(1634100118.952:3432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 04:41:59 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x8) 04:41:59 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 191.530641][T16256] loop5: detected capacity change from 0 to 264192 [ 191.565289][ T22] audit: type=1326 audit(1634100118.952:3433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 191.619761][ T22] audit: type=1326 audit(1634100118.952:3434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 191.650654][ T22] audit: type=1326 audit(1634100118.952:3435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 191.680824][ T22] audit: type=1326 audit(1634100118.952:3436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 191.707469][ T22] audit: type=1326 audit(1634100118.952:3437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 191.732919][ T22] audit: type=1326 audit(1634100118.952:3438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 191.758282][ T22] audit: type=1326 audit(1634100118.952:3439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 191.783664][ T22] audit: type=1326 audit(1634100118.952:3440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16226 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 04:41:59 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x80, 0x3, 0xba, 0xb9, 0x0, 0x7fffffff, 0x4c050, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000040)}, 0x100, 0x1, 0x8, 0x2, 0xa4a, 0x2400, 0x3f, 0x0, 0xfffff000, 0x0, 0x541}, r2, 0x8, r0, 0x0) 04:41:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x3000000, 0x0) 04:41:59 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:41:59 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{0x0}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:59 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x9) 04:41:59 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffffffff000}], 0x1) 04:41:59 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:41:59 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xa) [ 192.339936][T16286] loop5: detected capacity change from 0 to 264192 04:41:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x4000000, 0x0) 04:42:00 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xf9fdffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x5000000, 0x0) 04:42:00 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 192.498660][T16316] loop5: detected capacity change from 0 to 264192 04:42:00 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:00 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xb) 04:42:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x6000000, 0x0) 04:42:00 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:42:00 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x30180, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x3, 0x9, 0x9, 0x8, 0x0, 0x1bb95ded, 0xc0900, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x800, 0x0, @perf_config_ext={0x1, 0xfffffffffffffff9}, 0x11d0, 0x2, 0xfffff48b, 0x2, 0xffffffffffffff80, 0x101, 0x2, 0x0, 0x4, 0x0, 0xffffffffffffffff}, r1, 0x5, r0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 04:42:00 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x7ffffffffffff}], 0x1) 04:42:00 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="157a3fd8d7753438c898bd9add0c297e4c1e3e01f0e08ad1f601416183cfa09f2995c94ef3754df0bb663ef1d75d6a0084dc230a97870422c62e61559cddd6102a92fb6cece6da5e20571f56c944972d7e8fc5", 0x53}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:42:00 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffff888102901aa8}], 0x1) 04:42:00 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xc) [ 193.320006][T16342] loop5: detected capacity change from 0 to 264192 04:42:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x7000000, 0x0) 04:42:00 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:01 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffff88810290ace8}], 0x1) 04:42:01 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x20, 0xc0, 0x0, 0x7fff, 0x4000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x445, 0x4, @perf_config_ext={0xa, 0xfd91}, 0x1098, 0x2d5, 0x40, 0x4, 0xffff, 0x7, 0xfff8, 0x0, 0x80000001, 0x0, 0x2}, 0xffffffffffffffff, 0xa, r0, 0x2) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x1, 0x80, 0x5b, 0x1f, 0x1, 0x20, 0x0, 0x8, 0x28a16, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_config_ext={0xffff, 0x40}, 0x4, 0x1, 0x7fffffff, 0x5, 0x401, 0x2, 0x3, 0x0, 0x4, 0x0, 0x2}) read(r1, &(0x7f0000000080)=""/232, 0xe8) 04:42:01 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xd) 04:42:01 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:42:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x8000000, 0x0) 04:42:01 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffff88810290b468}], 0x1) 04:42:01 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) [ 193.508487][T16380] loop5: detected capacity change from 0 to 264192 04:42:01 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xfffffffffffffdef}], 0x1) 04:42:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x9000000, 0x0) 04:42:01 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:01 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xf) 04:42:01 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:42:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xa000000, 0x0) [ 193.633885][T16409] loop5: detected capacity change from 0 to 264192 04:42:01 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, &(0x7f0000000140)=""/62, 0x3e, 0x76) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) sendmsg$AUDIT_SET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x38, 0x3e9, 0x20, 0x70bd2a, 0x25dfdbf7, {0x4, 0x1, 0x2, r1, 0x7fff, 0x7f, 0xfff, 0x81, 0x0, 0x3}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x4) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) 04:42:01 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x10) 04:42:01 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0xffffffffffffffff}], 0x1) 04:42:01 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x1}) 04:42:01 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xfffdffff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xb000000, 0x0) 04:42:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xc000000, 0x0) 04:42:02 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 04:42:02 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x2) 04:42:02 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x11) [ 194.449930][T16445] loop5: detected capacity change from 0 to 264192 04:42:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xffff1f00, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xd000000, 0x0) [ 194.603502][T16479] loop5: detected capacity change from 0 to 264192 04:42:02 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x18a00, 0x8c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000240)={@mcast2, 0x0}, &(0x7f0000000280)=0x14) connect$packet(r0, &(0x7f00000002c0)={0x11, 0x17, r1, 0x1, 0x1, 0x6, @multicast}, 0x14) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/62, 0x3e, 0x76) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x31, 0x1, 0x81, 0x61, 0x0, 0x0, 0x4004, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x96d, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x4020, 0x1, 0x8, 0x2, 0xfffffffffffffa18, 0x8, 0xff21, 0x0, 0x8000, 0x0, 0x2}, r3, 0xb, 0xffffffffffffffff, 0x1) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r4, &(0x7f0000000080)=""/232, 0xe8) 04:42:02 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 04:42:02 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x3) 04:42:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xe000000, 0x0) 04:42:02 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x112) 04:42:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xfffffdf9, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 195.328154][T16498] loop5: detected capacity change from 0 to 264192 [ 195.352967][T16505] FAULT_INJECTION: forcing a failure. [ 195.352967][T16505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 195.366053][T16505] CPU: 0 PID: 16505 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 195.374900][T16505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.385046][T16505] Call Trace: [ 195.388403][T16505] dump_stack_lvl+0xd6/0x122 [ 195.392987][T16505] dump_stack+0x11/0x1b [ 195.397152][T16505] should_fail+0x23c/0x250 [ 195.401558][T16505] should_fail_usercopy+0x16/0x20 [ 195.406652][T16505] _copy_from_user+0x1c/0xd0 [ 195.411324][T16505] iovec_from_user+0xc4/0x2e0 [ 195.415993][T16505] ? _kstrtoull+0x301/0x320 [ 195.420484][T16505] __import_iovec+0x57/0x2c0 [ 195.425090][T16505] import_iovec+0x69/0x80 [ 195.429437][T16505] do_writev+0x13c/0x440 [ 195.433742][T16505] ? vfs_write+0x61a/0x900 [ 195.438307][T16505] __x64_sys_writev+0x41/0x50 [ 195.443088][T16505] do_syscall_64+0x44/0xa0 [ 195.447493][T16505] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 195.453526][T16505] RIP: 0033:0x7f1559e38a79 [ 195.458005][T16505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:42:03 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x4) [ 195.477658][T16505] RSP: 002b:00007f1557bb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 195.486331][T16505] RAX: ffffffffffffffda RBX: 00007f1559f3cf60 RCX: 00007f1559e38a79 [ 195.494285][T16505] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 195.502247][T16505] RBP: 00007f1557bb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 195.510210][T16505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.518178][T16505] R13: 00007fffc73856bf R14: 00007f1557bb0300 R15: 0000000000022000 04:42:03 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 04:42:03 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x300) 04:42:03 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x5) 04:42:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x10000000, 0x0) [ 195.601501][T16514] loop5: detected capacity change from 0 to 264192 [ 195.636631][T16526] FAULT_INJECTION: forcing a failure. [ 195.636631][T16526] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 195.649947][T16526] CPU: 1 PID: 16526 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 195.658709][T16526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.668749][T16526] Call Trace: [ 195.672017][T16526] dump_stack_lvl+0xd6/0x122 [ 195.676596][T16526] dump_stack+0x11/0x1b [ 195.680741][T16526] should_fail+0x23c/0x250 [ 195.685223][T16526] __alloc_pages+0x102/0x320 [ 195.689809][T16526] alloc_pages+0x382/0x3d0 [ 195.694218][T16526] __page_cache_alloc+0x4d/0xf0 [ 195.699099][T16526] pagecache_get_page+0x5fe/0x910 [ 195.704265][T16526] grab_cache_page_write_begin+0x3f/0x70 [ 195.709901][T16526] ext4_da_write_begin+0x323/0x570 [ 195.715080][T16526] generic_perform_write+0x1b8/0x3e0 [ 195.720434][T16526] ext4_buffered_write_iter+0x305/0x400 [ 195.726058][T16526] ext4_file_write_iter+0x2e7/0x11f0 [ 195.731542][T16526] ? get_page_from_freelist+0x55e/0x830 [ 195.737084][T16526] ? should_fail+0xd6/0x250 [ 195.741581][T16526] ? _copy_from_user+0x94/0xd0 [ 195.746371][T16526] do_iter_readv_writev+0x2de/0x380 [ 195.751604][T16526] do_iter_write+0x192/0x5c0 [ 195.756195][T16526] do_writev+0x210/0x440 [ 195.760429][T16526] ? vfs_write+0x61a/0x900 [ 195.764836][T16526] __x64_sys_writev+0x41/0x50 [ 195.769504][T16526] do_syscall_64+0x44/0xa0 [ 195.773943][T16526] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 195.779833][T16526] RIP: 0033:0x7f1559e38a79 [ 195.784267][T16526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 195.803981][T16526] RSP: 002b:00007f1557bb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 195.812396][T16526] RAX: ffffffffffffffda RBX: 00007f1559f3cf60 RCX: 00007f1559e38a79 [ 195.820401][T16526] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 195.828375][T16526] RBP: 00007f1557bb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 195.836330][T16526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.844288][T16526] R13: 00007fffc73856bf R14: 00007f1557bb0300 R15: 0000000000022000 04:42:03 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x305002, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000180)={0x1f, 0x7, 0xc6c, {0xe9, 0x5}, 0x0, 0x3}) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:42:03 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xfffffdff, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x11000000, 0x0) 04:42:03 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x6) 04:42:03 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xd00) 04:42:03 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 3) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 196.310856][T16555] FAULT_INJECTION: forcing a failure. [ 196.310856][T16555] name failslab, interval 1, probability 0, space 0, times 0 [ 196.313534][T16556] loop5: detected capacity change from 0 to 264192 [ 196.323509][T16555] CPU: 0 PID: 16555 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 196.338821][T16555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.348989][T16555] Call Trace: [ 196.352271][T16555] dump_stack_lvl+0xd6/0x122 [ 196.356961][T16555] dump_stack+0x11/0x1b [ 196.361120][T16555] should_fail+0x23c/0x250 [ 196.365536][T16555] ? kcalloc+0x32/0x50 [ 196.369667][T16555] __should_failslab+0x81/0x90 [ 196.374514][T16555] should_failslab+0x5/0x20 [ 196.379017][T16555] __kmalloc+0x6f/0x350 [ 196.383161][T16555] ? __crc32c_le_base+0x250/0x350 [ 196.388175][T16555] kcalloc+0x32/0x50 [ 196.392067][T16555] ext4_find_extent+0x21c/0x7f0 [ 196.396919][T16555] ? mark_page_accessed+0x1e3/0x550 [ 196.402117][T16555] ext4_ext_map_blocks+0x115/0x1ff0 [ 196.407457][T16555] ? xas_create+0xadc/0xb30 [ 196.411964][T16555] ? ext4_es_lookup_extent+0x206/0x490 [ 196.417504][T16555] ext4_da_get_block_prep+0x3b4/0x970 [ 196.422868][T16555] __block_write_begin_int+0x4c5/0x1080 [ 196.428435][T16555] ? ext4_da_release_space+0x230/0x230 [ 196.433889][T16555] ? ext4_da_release_space+0x230/0x230 [ 196.439340][T16555] __block_write_begin+0x2b/0x40 [ 196.444320][T16555] ext4_da_write_begin+0x34e/0x570 [ 196.449421][T16555] generic_perform_write+0x1b8/0x3e0 [ 196.454698][T16555] ext4_buffered_write_iter+0x305/0x400 [ 196.460233][T16555] ext4_file_write_iter+0x2e7/0x11f0 [ 196.465531][T16555] ? get_page_from_freelist+0x55e/0x830 [ 196.471067][T16555] ? should_fail+0xd6/0x250 [ 196.475593][T16555] ? _copy_from_user+0x94/0xd0 [ 196.480343][T16555] do_iter_readv_writev+0x2de/0x380 [ 196.485587][T16555] do_iter_write+0x192/0x5c0 [ 196.490196][T16555] do_writev+0x210/0x440 [ 196.494434][T16555] ? vfs_write+0x61a/0x900 [ 196.498840][T16555] __x64_sys_writev+0x41/0x50 [ 196.503507][T16555] do_syscall_64+0x44/0xa0 [ 196.507913][T16555] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 196.513866][T16555] RIP: 0033:0x7f1559e38a79 [ 196.518344][T16555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 196.537941][T16555] RSP: 002b:00007f1557bb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 196.546337][T16555] RAX: ffffffffffffffda RBX: 00007f1559f3cf60 RCX: 00007f1559e38a79 [ 196.554303][T16555] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 04:42:04 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xe00) 04:42:04 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x12000000, 0x0) [ 196.562266][T16555] RBP: 00007f1557bb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 196.570274][T16555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.578239][T16555] R13: 00007fffc73856bf R14: 00007f1557bb0300 R15: 0000000000022000 04:42:04 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x7) [ 196.635925][ T22] kauditd_printk_skb: 176 callbacks suppressed [ 196.635936][ T22] audit: type=1326 audit(1634100124.202:3617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 04:42:04 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xf00) 04:42:04 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xffffff85, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 196.698075][ T22] audit: type=1326 audit(1634100124.202:3618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 196.753540][T16589] loop5: detected capacity change from 0 to 264192 [ 196.763376][ T22] audit: type=1326 audit(1634100124.202:3619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 196.790195][ T22] audit: type=1326 audit(1634100124.202:3620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 [ 196.824884][ T22] audit: type=1326 audit(1634100124.212:3621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 196.849789][ T22] audit: type=1326 audit(1634100124.212:3622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=17 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 196.875095][ T22] audit: type=1326 audit(1634100124.212:3623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 196.900171][ T22] audit: type=1326 audit(1634100124.212:3624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 196.925291][ T22] audit: type=1326 audit(1634100124.252:3625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af1b34a79 code=0x7ffc0000 [ 196.950281][ T22] audit: type=1326 audit(1634100124.252:3626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16569 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1af1ae7994 code=0x7ffc0000 04:42:04 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000ac0), 0x181, 0x0) write$sndseq(r1, &(0x7f0000000b00)=[{0x3f, 0x4, 0x80, 0x0, @time={0x8000, 0x5}, {0x9, 0x2}, {0x6, 0x40}, @quote={{0x4, 0x20}, 0x3}}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000180)={0x0, 0x2, 'client0\x00', 0xffffffff80000007, "53b5e4c66266eada", "fe31076d592891216bb02c7cf450dc1f1a7cfbf9dd5d8f2a82da1786e61a5ee4", 0x1, 0x401}) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:42:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x25000000, 0x0) 04:42:04 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x8) 04:42:04 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 04:42:04 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1001) 04:42:04 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x40000000, 0x0) 04:42:04 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1100) [ 197.283032][T16610] FAULT_INJECTION: forcing a failure. [ 197.283032][T16610] name failslab, interval 1, probability 0, space 0, times 0 [ 197.295802][T16610] CPU: 0 PID: 16610 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 197.304561][T16610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.314611][T16610] Call Trace: [ 197.316788][T16614] loop5: detected capacity change from 0 to 264192 [ 197.317887][T16610] dump_stack_lvl+0xd6/0x122 [ 197.317911][T16610] dump_stack+0x11/0x1b [ 197.317941][T16610] should_fail+0x23c/0x250 [ 197.337548][T16610] ? __es_insert_extent+0x51f/0xe70 [ 197.342857][T16610] __should_failslab+0x81/0x90 [ 197.347613][T16610] should_failslab+0x5/0x20 [ 197.352107][T16610] kmem_cache_alloc+0x4f/0x300 [ 197.357126][T16610] __es_insert_extent+0x51f/0xe70 [ 197.362175][T16610] ext4_es_insert_extent+0x1cb/0x1950 [ 197.367604][T16610] ext4_ext_map_blocks+0x100a/0x1ff0 [ 197.372876][T16610] ? xas_create+0xadc/0xb30 [ 197.377376][T16610] ext4_da_get_block_prep+0x3b4/0x970 [ 197.382743][T16610] __block_write_begin_int+0x4c5/0x1080 [ 197.388281][T16610] ? ext4_da_release_space+0x230/0x230 [ 197.393801][T16610] ? ext4_da_release_space+0x230/0x230 [ 197.399345][T16610] __block_write_begin+0x2b/0x40 [ 197.404296][T16610] ext4_da_write_begin+0x34e/0x570 [ 197.409448][T16610] generic_perform_write+0x1b8/0x3e0 [ 197.414721][T16610] ext4_buffered_write_iter+0x305/0x400 [ 197.420254][T16610] ext4_file_write_iter+0x2e7/0x11f0 [ 197.425526][T16610] ? get_page_from_freelist+0x55e/0x830 [ 197.431099][T16610] ? should_fail+0xd6/0x250 [ 197.435639][T16610] ? _copy_from_user+0x94/0xd0 [ 197.440413][T16610] do_iter_readv_writev+0x2de/0x380 [ 197.445664][T16610] do_iter_write+0x192/0x5c0 [ 197.450259][T16610] do_writev+0x210/0x440 [ 197.454487][T16610] ? vfs_write+0x61a/0x900 [ 197.458890][T16610] __x64_sys_writev+0x41/0x50 [ 197.463553][T16610] do_syscall_64+0x44/0xa0 [ 197.468051][T16610] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 197.473967][T16610] RIP: 0033:0x7f1559e38a79 [ 197.478366][T16610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 197.497964][T16610] RSP: 002b:00007f1557bb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 197.506376][T16610] RAX: ffffffffffffffda RBX: 00007f1559f3cf60 RCX: 00007f1559e38a79 [ 197.514360][T16610] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 197.522359][T16610] RBP: 00007f1557bb01d0 R08: 0000000000000000 R09: 0000000000000000 04:42:05 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x9) [ 197.530329][T16610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.538280][T16610] R13: 00007fffc73856bf R14: 00007f1557bb0300 R15: 0000000000022000 04:42:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x48000000, 0x0) 04:42:05 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 04:42:05 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1200) [ 197.648169][T16645] FAULT_INJECTION: forcing a failure. [ 197.648169][T16645] name failslab, interval 1, probability 0, space 0, times 0 [ 197.660834][T16645] CPU: 0 PID: 16645 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 197.669887][T16645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.680079][T16645] Call Trace: [ 197.683396][T16645] dump_stack_lvl+0xd6/0x122 [ 197.688068][T16645] dump_stack+0x11/0x1b [ 197.692226][T16645] should_fail+0x23c/0x250 [ 197.696666][T16645] ? __es_insert_extent+0x51f/0xe70 [ 197.701854][T16645] __should_failslab+0x81/0x90 [ 197.706648][T16645] should_failslab+0x5/0x20 [ 197.711159][T16645] kmem_cache_alloc+0x4f/0x300 [ 197.715916][T16645] __es_insert_extent+0x51f/0xe70 [ 197.721007][T16645] ? ext4_get_reserved_space+0x9/0x20 [ 197.726375][T16645] ext4_es_insert_delayed_block+0x11b/0x390 [ 197.732276][T16645] ext4_da_get_block_prep+0x506/0x970 [ 197.737639][T16645] __block_write_begin_int+0x4c5/0x1080 [ 197.743306][T16645] ? ext4_da_release_space+0x230/0x230 [ 197.748818][T16645] ? ext4_da_release_space+0x230/0x230 [ 197.754274][T16645] __block_write_begin+0x2b/0x40 [ 197.759223][T16645] ext4_da_write_begin+0x34e/0x570 [ 197.764353][T16645] generic_perform_write+0x1b8/0x3e0 [ 197.769648][T16645] ext4_buffered_write_iter+0x305/0x400 [ 197.775194][T16645] ext4_file_write_iter+0x2e7/0x11f0 [ 197.780550][T16645] ? get_page_from_freelist+0x55e/0x830 [ 197.786137][T16645] ? should_fail+0xd6/0x250 [ 197.790635][T16645] ? _copy_from_user+0x94/0xd0 [ 197.795409][T16645] do_iter_readv_writev+0x2de/0x380 [ 197.800609][T16645] do_iter_write+0x192/0x5c0 [ 197.805269][T16645] do_writev+0x210/0x440 [ 197.809692][T16645] ? vfs_write+0x61a/0x900 [ 197.814121][T16645] __x64_sys_writev+0x41/0x50 [ 197.818795][T16645] do_syscall_64+0x44/0xa0 [ 197.823215][T16645] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 197.829184][T16645] RIP: 0033:0x7f1559e38a79 [ 197.833585][T16645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 197.853219][T16645] RSP: 002b:00007f1557bb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 197.861620][T16645] RAX: ffffffffffffffda RBX: 00007f1559f3cf60 RCX: 00007f1559e38a79 [ 197.869577][T16645] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 197.877535][T16645] RBP: 00007f1557bb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.885494][T16645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.893449][T16645] R13: 00007fffc73856bf R14: 00007f1557bb0300 R15: 0000000000022000 04:42:05 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000180)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x2}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000200)="fd1e74fdfc2f2dc3d4d5671a6470d73eecac3c297c4e7cd91e77e600bc9459b93b98be623e4a9f07b2eda780e4e06d85eadf30eb6fc8c58ca1e2af4a6d852404db919f777b14513b382a9fc17c78", 0x4e}, {&(0x7f0000000280)="07c9c43d54077d5e603032b0a4db141a6d2a46d6797649d8b6aaeb4ba48e9837cc2fedffa4eb9ed8baee9f8c40e4c154557bce3379e4c06a9c0ece4ff5d98e1512e83e4c04c6e6c288bb362d3795b369a1ffcf18f5f0ebcd9918a87a469cc5c67a2cd7af8202333011fcadc75b8ad55adaf13fe27d0e7d7c0084ecaa82f80a9b695ff290940cd68ba39fb365f0b0929b349a2b216ba7eb931168bfb1a6531fb56d6d83", 0xa3}, {&(0x7f0000000340)="9fd3fc66b0dedc7222db1afa9da30d57a2584d89a5c58ef53240bd79cb0921b96ac6744a82d37d3723f57baf5fdf5fdfdf4b02c390ccc29ddf90387882205061b21b260157da894783d2107333f75c6a18f3508fd47f5493df387e59188469710e9e5fa1c828f346444188ce2c2a272e71193a5f613a1efd03a63bd8da73536dc725f8d027e74582eb27614f0904868a06fdbc86deb46aa6726ac765964c75951ac7196aec990a390bab68937a2a18d9872c9334b6", 0xb5}, {&(0x7f0000000400)="f50d661d6a8bc7ffed6dec706c5a8f3334591ea8cb71428272394e873573d780b876b47f03d2beae8ebc0c6f055d23a71a681ad672e45d0624e4b3d2c5fefd49b5451789a7547fc3f8a7c7ae994526906eb2071a6c69df323c135f084b9f2312688a6cdbe5959b81828a918d0623", 0x6e}], 0x4}, 0x40) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/232, 0xe8) 04:42:05 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xa) 04:42:05 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xffffffda, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x4c000000, 0x0) 04:42:05 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x8200) 04:42:05 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 198.177794][T16660] FAULT_INJECTION: forcing a failure. [ 198.177794][T16660] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 198.190881][T16660] CPU: 0 PID: 16660 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 198.199636][T16660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.209689][T16660] Call Trace: [ 198.212961][T16660] dump_stack_lvl+0xd6/0x122 [ 198.217552][T16660] dump_stack+0x11/0x1b [ 198.220756][T16669] loop5: detected capacity change from 0 to 264192 [ 198.221748][T16660] should_fail+0x23c/0x250 [ 198.221770][T16660] should_fail_usercopy+0x16/0x20 [ 198.237699][T16660] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 198.243433][T16660] generic_perform_write+0x201/0x3e0 [ 198.248809][T16660] ext4_buffered_write_iter+0x305/0x400 [ 198.254359][T16660] ext4_file_write_iter+0x2e7/0x11f0 [ 198.259653][T16660] ? get_page_from_freelist+0x55e/0x830 [ 198.265208][T16660] ? should_fail+0xd6/0x250 [ 198.269785][T16660] ? _copy_from_user+0x94/0xd0 [ 198.274617][T16660] do_iter_readv_writev+0x2de/0x380 [ 198.279824][T16660] do_iter_write+0x192/0x5c0 [ 198.284454][T16660] do_writev+0x210/0x440 [ 198.288736][T16660] ? vfs_write+0x61a/0x900 [ 198.293164][T16660] __x64_sys_writev+0x41/0x50 [ 198.297840][T16660] do_syscall_64+0x44/0xa0 [ 198.302324][T16660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 198.308210][T16660] RIP: 0033:0x7f1559e38a79 [ 198.312614][T16660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 198.332396][T16660] RSP: 002b:00007f1557bb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 198.340796][T16660] RAX: ffffffffffffffda RBX: 00007f1559f3cf60 RCX: 00007f1559e38a79 [ 198.348760][T16660] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 198.356885][T16660] RBP: 00007f1557bb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.364928][T16660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 04:42:05 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x8400) 04:42:05 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xffffffe5, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) [ 198.372939][T16660] R13: 00007fffc73856bf R14: 00007f1557bb0300 R15: 0000000000022000 04:42:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x68000000, 0x0) 04:42:06 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xb) 04:42:06 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x8600) 04:42:06 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 198.459396][T16689] loop5: detected capacity change from 0 to 264192 [ 198.508667][T16705] FAULT_INJECTION: forcing a failure. [ 198.508667][T16705] name failslab, interval 1, probability 0, space 0, times 0 [ 198.521315][T16705] CPU: 0 PID: 16705 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 198.530084][T16705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.540127][T16705] Call Trace: [ 198.543403][T16705] dump_stack_lvl+0xd6/0x122 [ 198.548060][T16705] dump_stack+0x11/0x1b [ 198.552205][T16705] should_fail+0x23c/0x250 [ 198.556610][T16705] ? ext4_init_io_end+0x2d/0xa0 [ 198.561464][T16705] __should_failslab+0x81/0x90 [ 198.566222][T16705] should_failslab+0x5/0x20 [ 198.570719][T16705] kmem_cache_alloc+0x4f/0x300 [ 198.575471][T16705] ext4_init_io_end+0x2d/0xa0 [ 198.580202][T16705] ext4_writepages+0x6e5/0x1d70 [ 198.585104][T16705] ? __brelse+0x2c/0x50 [ 198.589249][T16705] ? ext4_mark_iloc_dirty+0x161a/0x1700 [ 198.594783][T16705] ? ext4_dirty_inode+0x58/0xa0 [ 198.599637][T16705] ? __ext4_journal_stop+0x47/0x110 [ 198.604825][T16705] ? ext4_expand_extra_isize+0x560/0x560 [ 198.610443][T16705] ? ext4_dirty_inode+0x9a/0xa0 [ 198.615336][T16705] ? ext4_readpage+0x140/0x140 [ 198.620088][T16705] do_writepages+0x26b/0x3c0 [ 198.624683][T16705] ? generic_write_end+0x157/0x180 [ 198.629856][T16705] file_write_and_wait_range+0x1ae/0x240 [ 198.635509][T16705] ext4_sync_file+0x105/0x670 [ 198.640245][T16705] ? tsan.module_ctor+0x10/0x10 [ 198.645168][T16705] vfs_fsync_range+0x107/0x120 [ 198.649924][T16705] ext4_buffered_write_iter+0x3af/0x400 [ 198.655532][T16705] ext4_file_write_iter+0x2e7/0x11f0 [ 198.660806][T16705] ? get_page_from_freelist+0x55e/0x830 [ 198.666409][T16705] ? should_fail+0xd6/0x250 [ 198.670897][T16705] ? _copy_from_user+0x94/0xd0 [ 198.675688][T16705] do_iter_readv_writev+0x2de/0x380 [ 198.680876][T16705] do_iter_write+0x192/0x5c0 [ 198.685510][T16705] do_writev+0x210/0x440 [ 198.689738][T16705] ? vfs_write+0x61a/0x900 [ 198.694140][T16705] __x64_sys_writev+0x41/0x50 [ 198.698803][T16705] do_syscall_64+0x44/0xa0 [ 198.703225][T16705] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 198.709113][T16705] RIP: 0033:0x7f1559e38a79 [ 198.713513][T16705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 198.733144][T16705] RSP: 002b:00007f1557bb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 198.741584][T16705] RAX: ffffffffffffffda RBX: 00007f1559f3cf60 RCX: 00007f1559e38a79 [ 198.749540][T16705] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 [ 198.757526][T16705] RBP: 00007f1557bb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.765484][T16705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.773523][T16705] R13: 00007fffc73856bf R14: 00007f1557bb0300 R15: 0000000000022000 04:42:06 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000500)=0x9) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x80, 0x3, 0x8, 0xc7, 0x0, 0x3, 0x80004, 0xf, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000040), 0xf}, 0x41000, 0x1, 0x3e, 0x8, 0x0, 0x6, 0x8c, 0x0, 0x7, 0x0, 0x7}, r1, 0x4, r0, 0x1) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = syz_open_dev$vcsu(&(0x7f00000002c0), 0x9, 0x40542) getsockopt$sock_int(r3, 0x1, 0x10, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xaa5000000000) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r4, &(0x7f0000000080)=""/232, 0xe8) 04:42:06 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xfffffff0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:06 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xc) 04:42:06 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xfdef) 04:42:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x6c000000, 0x0) 04:42:06 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 199.146682][T16725] FAULT_INJECTION: forcing a failure. [ 199.146682][T16725] name failslab, interval 1, probability 0, space 0, times 0 [ 199.159430][T16725] CPU: 0 PID: 16725 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 199.168203][T16725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.178248][T16725] Call Trace: [ 199.181542][T16725] dump_stack_lvl+0xd6/0x122 [ 199.186119][T16725] dump_stack+0x11/0x1b [ 199.190307][T16725] should_fail+0x23c/0x250 [ 199.194714][T16725] ? ext4_init_io_end+0x2d/0xa0 [ 199.199566][T16725] __should_failslab+0x81/0x90 [ 199.204340][T16725] should_failslab+0x5/0x20 [ 199.208911][T16725] kmem_cache_alloc+0x4f/0x300 [ 199.213792][T16725] ext4_init_io_end+0x2d/0xa0 [ 199.218468][T16725] ext4_writepages+0x7ad/0x1d70 [ 199.223317][T16725] ? __brelse+0x2c/0x50 [ 199.227558][T16725] ? ext4_mark_iloc_dirty+0x161a/0x1700 [ 199.233143][T16725] ? ext4_dirty_inode+0x58/0xa0 [ 199.237989][T16725] ? __ext4_journal_stop+0x47/0x110 [ 199.243197][T16725] ? ext4_expand_extra_isize+0x560/0x560 [ 199.248820][T16725] ? ext4_dirty_inode+0x9a/0xa0 [ 199.253662][T16725] ? ext4_readpage+0x140/0x140 [ 199.258420][T16725] do_writepages+0x26b/0x3c0 [ 199.262998][T16725] ? generic_write_end+0x157/0x180 [ 199.268120][T16725] file_write_and_wait_range+0x1ae/0x240 [ 199.273747][T16725] ext4_sync_file+0x105/0x670 [ 199.278475][T16725] ? tsan.module_ctor+0x10/0x10 [ 199.283329][T16725] vfs_fsync_range+0x107/0x120 [ 199.288095][T16725] ext4_buffered_write_iter+0x3af/0x400 [ 199.293625][T16725] ext4_file_write_iter+0x2e7/0x11f0 [ 199.298894][T16725] ? get_page_from_freelist+0x55e/0x830 [ 199.304429][T16725] ? should_fail+0xd6/0x250 [ 199.309005][T16725] ? _copy_from_user+0x94/0xd0 [ 199.313766][T16725] do_iter_readv_writev+0x2de/0x380 [ 199.319018][T16725] do_iter_write+0x192/0x5c0 [ 199.323641][T16725] do_writev+0x210/0x440 [ 199.327872][T16725] ? vfs_write+0x61a/0x900 [ 199.332335][T16725] __x64_sys_writev+0x41/0x50 [ 199.337066][T16725] do_syscall_64+0x44/0xa0 [ 199.341473][T16725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 199.347356][T16725] RIP: 0033:0x7f1559e38a79 [ 199.351762][T16725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 199.371461][T16725] RSP: 002b:00007f1557bb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 199.379866][T16725] RAX: ffffffffffffffda RBX: 00007f1559f3cf60 RCX: 00007f1559e38a79 [ 199.387915][T16725] RDX: 0000000000000001 RSI: 0000000020000400 RDI: 0000000000000003 04:42:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x74000000, 0x0) 04:42:07 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xd) 04:42:07 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x8800000) [ 199.395873][T16725] RBP: 00007f1557bb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 199.403835][T16725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.411886][T16725] R13: 00007fffc73856bf R14: 00007f1557bb0300 R15: 0000000000022000 [ 199.433554][T16729] loop5: detected capacity change from 0 to 264192 04:42:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x7a000000, 0x0) 04:42:07 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0xf) [ 199.526066][T16756] loop5: detected capacity change from 0 to 264192 04:42:07 executing program 0: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x1) (fail_nth: 9) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 04:42:07 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x20000201) 04:42:07 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000940)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 04:42:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0x7ffff000, 0x0) 04:42:07 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffff7ffdffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) 04:42:07 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x10) 04:42:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00') pread64(r0, 0x0, 0xa1ffffff, 0x0) 04:42:07 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)="15", 0x1}], 0x11) [ 200.005648][T16785] loop5: detected capacity change from 0 to 264192 [ 200.016442][T16782] FAULT_INJECTION: forcing a failure. [ 200.016442][T16782] name failslab, interval 1, probability 0, space 0, times 0 [ 200.029155][T16782] CPU: 1 PID: 16782 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 [ 200.037912][T16782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.047961][T16782] Call Trace: [ 200.051287][T16782] dump_stack_lvl+0xd6/0x122 [ 200.055983][T16782] dump_stack+0x11/0x1b [ 200.060168][T16782] should_fail+0x23c/0x250 [ 200.064601][T16782] ? ext4_alloc_io_end_vec+0x2e/0xd0 [ 200.069872][T16782] __should_failslab+0x81/0x90 [ 200.074732][T16782] should_failslab+0x5/0x20 [ 200.079220][T16782] kmem_cache_alloc+0x4f/0x300 [ 200.084047][T16782] ext4_alloc_io_end_vec+0x2e/0xd0 [ 200.089149][T16782] ext4_writepages+0xacd/0x1d70 [ 200.094085][T16782] ? __brelse+0x2c/0x50 [ 200.098246][T16782] ? ext4_mark_iloc_dirty+0x161a/0x1700 [ 200.103805][T16782] ? ext4_dirty_inode+0x58/0xa0 [ 200.108645][T16782] ? __ext4_journal_stop+0x47/0x110 [ 200.113831][T16782] ? ext4_expand_extra_isize+0x560/0x560 [ 200.119509][T16782] ? ext4_dirty_inode+0x9a/0xa0 [ 200.124358][T16782] ? ext4_readpage+0x140/0x140 [ 200.129109][T16782] do_writepages+0x26b/0x3c0 [ 200.133691][T16782] ? generic_write_end+0x157/0x180 [ 200.138785][T16782] file_write_and_wait_range+0x1ae/0x240 [ 200.144454][T16782] ext4_sync_file+0x105/0x670 [ 200.149116][T16782] ? tsan.module_ctor+0x10/0x10 [ 200.154009][T16782] vfs_fsync_range+0x107/0x120 [ 200.158759][T16782] ext4_buffered_write_iter+0x3af/0x400 [ 200.164336][T16782] ext4_file_write_iter+0x2e7/0x11f0 [ 200.169683][T16782] ? get_page_from_freelist+0x55e/0x830 [ 200.175299][T16782] ? should_fail+0xd6/0x250 [ 200.179787][T16782] ? _copy_from_user+0x94/0xd0 [ 200.184627][T16782] do_iter_readv_writev+0x2de/0x380 [ 200.189883][T16782] do_iter_write+0x192/0x5c0 [ 200.194460][T16782] do_writev+0x210/0x440 [ 200.198704][T16782] ? vfs_write+0x61a/0x900