Warning: Permanently added '[localhost]:22700' (ECDSA) to the list of known hosts. 2022/09/29 03:02:22 fuzzer started 2022/09/29 03:02:22 dialing manager at localhost:45751 syzkaller login: [ 43.894627] cgroup: Unknown subsys name 'net' [ 44.035694] cgroup: Unknown subsys name 'rlimit' 2022/09/29 03:02:36 syscalls: 2215 2022/09/29 03:02:36 code coverage: enabled 2022/09/29 03:02:36 comparison tracing: enabled 2022/09/29 03:02:36 extra coverage: enabled 2022/09/29 03:02:36 setuid sandbox: enabled 2022/09/29 03:02:36 namespace sandbox: enabled 2022/09/29 03:02:36 Android sandbox: enabled 2022/09/29 03:02:36 fault injection: enabled 2022/09/29 03:02:36 leak checking: enabled 2022/09/29 03:02:36 net packet injection: enabled 2022/09/29 03:02:36 net device setup: enabled 2022/09/29 03:02:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/29 03:02:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/29 03:02:36 USB emulation: enabled 2022/09/29 03:02:36 hci packet injection: enabled 2022/09/29 03:02:36 wifi device emulation: failed to parse kernel version (6.0.0-rc7-next-20220928) 2022/09/29 03:02:36 802.15.4 emulation: enabled 2022/09/29 03:02:36 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/29 03:02:36 fetching corpus: 42, signal 24965/28290 (executing program) 2022/09/29 03:02:36 fetching corpus: 92, signal 36608/41161 (executing program) 2022/09/29 03:02:36 fetching corpus: 142, signal 39944/45912 (executing program) 2022/09/29 03:02:36 fetching corpus: 192, signal 44699/51853 (executing program) 2022/09/29 03:02:37 fetching corpus: 242, signal 51198/59236 (executing program) 2022/09/29 03:02:37 fetching corpus: 292, signal 54549/63580 (executing program) 2022/09/29 03:02:37 fetching corpus: 342, signal 61696/71311 (executing program) 2022/09/29 03:02:37 fetching corpus: 392, signal 64835/75304 (executing program) 2022/09/29 03:02:37 fetching corpus: 442, signal 70686/81545 (executing program) 2022/09/29 03:02:37 fetching corpus: 492, signal 73841/85346 (executing program) 2022/09/29 03:02:37 fetching corpus: 542, signal 77696/89609 (executing program) 2022/09/29 03:02:37 fetching corpus: 592, signal 79747/92338 (executing program) 2022/09/29 03:02:38 fetching corpus: 642, signal 83187/96095 (executing program) 2022/09/29 03:02:38 fetching corpus: 692, signal 85401/98815 (executing program) 2022/09/29 03:02:38 fetching corpus: 742, signal 87485/101401 (executing program) 2022/09/29 03:02:38 fetching corpus: 792, signal 89691/103962 (executing program) 2022/09/29 03:02:38 fetching corpus: 842, signal 91896/106535 (executing program) 2022/09/29 03:02:38 fetching corpus: 892, signal 94587/109375 (executing program) 2022/09/29 03:02:38 fetching corpus: 942, signal 96699/111687 (executing program) 2022/09/29 03:02:39 fetching corpus: 992, signal 98141/113491 (executing program) 2022/09/29 03:02:39 fetching corpus: 1042, signal 100577/115961 (executing program) 2022/09/29 03:02:39 fetching corpus: 1092, signal 103102/118443 (executing program) 2022/09/29 03:02:39 fetching corpus: 1142, signal 104740/120191 (executing program) 2022/09/29 03:02:39 fetching corpus: 1192, signal 106676/122198 (executing program) 2022/09/29 03:02:39 fetching corpus: 1242, signal 108731/124206 (executing program) 2022/09/29 03:02:39 fetching corpus: 1292, signal 109893/125567 (executing program) 2022/09/29 03:02:39 fetching corpus: 1342, signal 111126/126913 (executing program) 2022/09/29 03:02:40 fetching corpus: 1392, signal 112904/128615 (executing program) 2022/09/29 03:02:40 fetching corpus: 1442, signal 115306/130621 (executing program) 2022/09/29 03:02:40 fetching corpus: 1492, signal 116254/131635 (executing program) 2022/09/29 03:02:40 fetching corpus: 1542, signal 118635/133520 (executing program) 2022/09/29 03:02:40 fetching corpus: 1592, signal 120258/134962 (executing program) 2022/09/29 03:02:40 fetching corpus: 1642, signal 121757/136267 (executing program) 2022/09/29 03:02:40 fetching corpus: 1692, signal 123620/137741 (executing program) 2022/09/29 03:02:41 fetching corpus: 1742, signal 124905/138827 (executing program) 2022/09/29 03:02:41 fetching corpus: 1792, signal 127080/140347 (executing program) 2022/09/29 03:02:41 fetching corpus: 1842, signal 127628/140962 (executing program) 2022/09/29 03:02:41 fetching corpus: 1892, signal 128930/141972 (executing program) 2022/09/29 03:02:41 fetching corpus: 1942, signal 130087/142868 (executing program) 2022/09/29 03:02:41 fetching corpus: 1992, signal 132255/144192 (executing program) 2022/09/29 03:02:41 fetching corpus: 2042, signal 133490/145056 (executing program) 2022/09/29 03:02:41 fetching corpus: 2092, signal 134757/145897 (executing program) 2022/09/29 03:02:41 fetching corpus: 2142, signal 135480/146530 (executing program) 2022/09/29 03:02:42 fetching corpus: 2192, signal 136143/147094 (executing program) 2022/09/29 03:02:42 fetching corpus: 2242, signal 137142/147723 (executing program) 2022/09/29 03:02:42 fetching corpus: 2292, signal 138385/148417 (executing program) 2022/09/29 03:02:42 fetching corpus: 2342, signal 139986/149227 (executing program) 2022/09/29 03:02:42 fetching corpus: 2392, signal 140584/149643 (executing program) 2022/09/29 03:02:42 fetching corpus: 2442, signal 141150/150044 (executing program) 2022/09/29 03:02:42 fetching corpus: 2492, signal 141740/150433 (executing program) 2022/09/29 03:02:42 fetching corpus: 2542, signal 142538/150899 (executing program) 2022/09/29 03:02:42 fetching corpus: 2592, signal 143285/151298 (executing program) 2022/09/29 03:02:43 fetching corpus: 2641, signal 144193/151712 (executing program) 2022/09/29 03:02:43 fetching corpus: 2691, signal 145013/152081 (executing program) 2022/09/29 03:02:43 fetching corpus: 2741, signal 145778/152410 (executing program) 2022/09/29 03:02:43 fetching corpus: 2791, signal 146510/152717 (executing program) 2022/09/29 03:02:43 fetching corpus: 2841, signal 147375/153027 (executing program) 2022/09/29 03:02:43 fetching corpus: 2891, signal 148354/153332 (executing program) 2022/09/29 03:02:43 fetching corpus: 2941, signal 149169/153592 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/153711 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/153776 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/153858 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/153930 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/153998 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154068 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154141 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154201 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154262 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154324 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154397 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154452 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154520 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154592 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154674 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154732 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154754 (executing program) 2022/09/29 03:02:43 fetching corpus: 2966, signal 149360/154754 (executing program) 2022/09/29 03:02:46 starting 8 fuzzer processes 03:02:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:02:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000007400)={&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000007440)=0x40) 03:02:46 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:02:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) [ 67.498611] audit: type=1400 audit(1664420566.200:6): avc: denied { execmem } for pid=286 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 03:02:46 executing program 4: unshare(0x20000200) unshare(0x4000200) 03:02:46 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000140)="8f857635", 0x4}], 0x5}}], 0x1, 0x0) 03:02:46 executing program 6: prctl$PR_SET_FPEXC(0xc, 0x0) ptrace$getregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x2, &(0x7f0000001800)=[{&(0x7f0000000540)="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", 0xfe3, 0x1f}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f00000018c0)={[{@sbsector={'sbsector', 0x3d, 0x100000001}}, {@utf8}, {}, {@map_normal}]}) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001900)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000001c40), &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)="fc", 0x1}], 0x1000001, &(0x7f0000001e00)={[{@shortname_lower}], [{@measure}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001e40), 0x4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001ec0), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, 0x0, 0x0) 03:02:46 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) [ 68.704400] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 68.707218] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 68.708607] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 68.720221] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 68.722627] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 68.724111] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 68.729218] Bluetooth: hci0: HCI_REQ-0x0c1a [ 68.770117] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 68.772146] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 68.774157] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 68.775476] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 68.777298] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 68.778447] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 68.780050] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 68.782332] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 68.785333] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 68.787427] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 68.789123] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 68.790191] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 68.790694] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 68.791671] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 68.793578] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 68.796172] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 68.798284] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 68.802197] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 68.802733] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 68.803195] Bluetooth: hci2: HCI_REQ-0x0c1a [ 68.805274] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 68.807762] Bluetooth: hci3: HCI_REQ-0x0c1a [ 68.822263] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 68.824466] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 68.826068] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 68.827451] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 68.830483] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 68.830621] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 68.835642] Bluetooth: hci4: HCI_REQ-0x0c1a [ 68.835790] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 68.838660] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 68.845795] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 68.847206] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 68.849270] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 68.851085] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 68.852338] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 68.856584] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 68.858060] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 68.859402] Bluetooth: hci1: HCI_REQ-0x0c1a [ 68.861058] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 68.862722] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 68.864326] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 68.866291] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 68.867647] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 68.869484] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 68.878772] Bluetooth: hci6: HCI_REQ-0x0c1a [ 68.880429] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 68.885006] Bluetooth: hci7: HCI_REQ-0x0c1a [ 68.897178] Bluetooth: hci5: HCI_REQ-0x0c1a [ 70.791614] Bluetooth: hci0: command 0x0409 tx timeout [ 70.854095] Bluetooth: hci2: command 0x0409 tx timeout [ 70.855269] Bluetooth: hci4: command 0x0409 tx timeout [ 70.856176] Bluetooth: hci3: command 0x0409 tx timeout [ 70.918049] Bluetooth: hci7: command 0x0409 tx timeout [ 70.919117] Bluetooth: hci6: command 0x0409 tx timeout [ 70.920357] Bluetooth: hci5: command 0x0409 tx timeout [ 70.921295] Bluetooth: hci1: command 0x0409 tx timeout [ 72.838955] Bluetooth: hci0: command 0x041b tx timeout [ 72.902119] Bluetooth: hci3: command 0x041b tx timeout [ 72.902921] Bluetooth: hci4: command 0x041b tx timeout [ 72.903724] Bluetooth: hci2: command 0x041b tx timeout [ 72.966150] Bluetooth: hci1: command 0x041b tx timeout [ 72.967511] Bluetooth: hci5: command 0x041b tx timeout [ 72.968253] Bluetooth: hci6: command 0x041b tx timeout [ 72.968986] Bluetooth: hci7: command 0x041b tx timeout [ 74.886009] Bluetooth: hci0: command 0x040f tx timeout [ 74.950061] Bluetooth: hci2: command 0x040f tx timeout [ 74.950576] Bluetooth: hci4: command 0x040f tx timeout [ 74.951025] Bluetooth: hci3: command 0x040f tx timeout [ 75.014026] Bluetooth: hci7: command 0x040f tx timeout [ 75.014504] Bluetooth: hci6: command 0x040f tx timeout [ 75.014981] Bluetooth: hci5: command 0x040f tx timeout [ 75.015379] Bluetooth: hci1: command 0x040f tx timeout [ 76.934527] Bluetooth: hci0: command 0x0419 tx timeout [ 76.998062] Bluetooth: hci3: command 0x0419 tx timeout [ 76.998519] Bluetooth: hci4: command 0x0419 tx timeout [ 76.998996] Bluetooth: hci2: command 0x0419 tx timeout [ 77.062022] Bluetooth: hci1: command 0x0419 tx timeout [ 77.062476] Bluetooth: hci5: command 0x0419 tx timeout [ 77.062899] Bluetooth: hci6: command 0x0419 tx timeout [ 77.063909] Bluetooth: hci7: command 0x0419 tx timeout 03:03:43 executing program 4: unshare(0x20000200) unshare(0x4000200) [ 124.344291] loop6: detected capacity change from 0 to 256 [ 124.393259] FAT-fs (loop6): Unrecognized mount option "measure" or missing value [ 124.427845] loop6: detected capacity change from 0 to 256 03:03:43 executing program 4: unshare(0x20000200) unshare(0x4000200) 03:03:43 executing program 6: prctl$PR_SET_FPEXC(0xc, 0x0) ptrace$getregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x2, &(0x7f0000001800)=[{&(0x7f0000000540)="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", 0xfe3, 0x1f}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f00000018c0)={[{@sbsector={'sbsector', 0x3d, 0x100000001}}, {@utf8}, {}, {@map_normal}]}) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001900)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000001c40), &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)="fc", 0x1}], 0x1000001, &(0x7f0000001e00)={[{@shortname_lower}], [{@measure}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001e40), 0x4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001ec0), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, 0x0, 0x0) 03:03:43 executing program 4: unshare(0x20000200) unshare(0x4000200) [ 124.583365] loop6: detected capacity change from 0 to 256 03:03:43 executing program 6: prctl$PR_SET_FPEXC(0xc, 0x0) ptrace$getregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x2, &(0x7f0000001800)=[{&(0x7f0000000540)="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", 0xfe3, 0x1f}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f00000018c0)={[{@sbsector={'sbsector', 0x3d, 0x100000001}}, {@utf8}, {}, {@map_normal}]}) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001900)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000001c40), &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)="fc", 0x1}], 0x1000001, &(0x7f0000001e00)={[{@shortname_lower}], [{@measure}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001e40), 0x4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001ec0), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, 0x0, 0x0) 03:03:43 executing program 4: clock_gettime(0x0, &(0x7f00000012c0)) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001300)) syz_mount_image$ext4(&(0x7f0000008700)='ext2\x00', &(0x7f0000008740)='./file0\x00', 0x0, 0x1, &(0x7f0000008840)=[{&(0x7f0000008780)='Y', 0x1}], 0x0, &(0x7f0000008880)={[{@journal_ioprio}], [{@fowner_lt}]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000008900), 0x0, 0x0) clock_gettime(0x0, 0x0) futex(0x0, 0x1, 0x2, 0x0, &(0x7f0000008bc0)=0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x4000) openat(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000008d40), 0x101382, 0x0) [ 124.702898] loop6: detected capacity change from 0 to 256 [ 124.726466] FAT-fs (loop6): Unrecognized mount option "measure" or missing value 03:03:43 executing program 6: prctl$PR_SET_FPEXC(0xc, 0x0) ptrace$getregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x2, &(0x7f0000001800)=[{&(0x7f0000000540)="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", 0xfe3, 0x1f}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f00000018c0)={[{@sbsector={'sbsector', 0x3d, 0x100000001}}, {@utf8}, {}, {@map_normal}]}) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001900)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000001c40), &(0x7f0000001c80)='./file0\x00', 0x0, 0x1, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)="fc", 0x1}], 0x1000001, &(0x7f0000001e00)={[{@shortname_lower}], [{@measure}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001e40), 0x4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001ec0), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, 0x0, 0x0) [ 124.815843] ext2: Unknown parameter 'fowner<00000000000000000000' [ 124.886135] ext2: Unknown parameter 'fowner<00000000000000000000' [ 124.896792] loop6: detected capacity change from 0 to 256 03:03:43 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000140)="8f857635", 0x4}], 0x5}}], 0x1, 0x0) [ 124.937629] FAT-fs (loop6): Unrecognized mount option "measure" or missing value [ 126.283510] loop0: detected capacity change from 0 to 5 [ 126.284643] ======================================================= [ 126.284643] WARNING: The mand mount option has been deprecated and [ 126.284643] and is ignored by this kernel. Remove the mand [ 126.284643] option from the mount to silence this warning. [ 126.284643] ======================================================= [ 126.298871] audit: type=1400 audit(1664420625.000:7): avc: denied { open } for pid=3939 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.301999] audit: type=1400 audit(1664420625.000:8): avc: denied { kernel } for pid=3939 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.306482] ------------[ cut here ]------------ [ 126.306505] [ 126.306508] ====================================================== [ 126.306512] WARNING: possible circular locking dependency detected [ 126.306517] 6.0.0-rc7-next-20220928 #1 Not tainted [ 126.306523] ------------------------------------------------------ [ 126.306527] syz-executor.0/3941 is trying to acquire lock: [ 126.306534] ffffffff853faab8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 126.306578] [ 126.306578] but task is already holding lock: [ 126.306582] ffff88800ebf9c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 126.306612] [ 126.306612] which lock already depends on the new lock. [ 126.306612] [ 126.306615] [ 126.306615] the existing dependency chain (in reverse order) is: [ 126.306619] [ 126.306619] -> #3 (&ctx->lock){....}-{2:2}: [ 126.306633] _raw_spin_lock+0x2a/0x40 [ 126.306647] __perf_event_task_sched_out+0x53b/0x18d0 [ 126.306661] __schedule+0xedd/0x2470 [ 126.306681] schedule+0xda/0x1b0 [ 126.306698] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.306711] syscall_exit_to_user_mode+0x19/0x40 [ 126.306727] do_syscall_64+0x48/0x90 [ 126.306738] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.306754] [ 126.306754] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 126.306768] _raw_spin_lock_nested+0x30/0x40 [ 126.306781] raw_spin_rq_lock_nested+0x1e/0x30 [ 126.306795] task_fork_fair+0x63/0x4d0 [ 126.306814] sched_cgroup_fork+0x3d0/0x540 [ 126.306830] copy_process+0x4183/0x6e20 [ 126.306841] kernel_clone+0xe7/0x890 [ 126.306851] user_mode_thread+0xad/0xf0 [ 126.306862] rest_init+0x24/0x250 [ 126.306877] arch_call_rest_init+0xf/0x14 [ 126.306897] start_kernel+0x4c6/0x4eb [ 126.306915] secondary_startup_64_no_verify+0xe0/0xeb [ 126.306931] [ 126.306931] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 126.306945] _raw_spin_lock_irqsave+0x39/0x60 [ 126.306958] try_to_wake_up+0xab/0x1930 [ 126.306972] up+0x75/0xb0 [ 126.306990] __up_console_sem+0x6e/0x80 [ 126.307008] console_unlock+0x46a/0x590 [ 126.307025] vprintk_emit+0x1bd/0x560 [ 126.307044] vprintk+0x84/0xa0 [ 126.307062] _printk+0xba/0xf1 [ 126.307076] kauditd_hold_skb.cold+0x3f/0x4e [ 126.307097] kauditd_send_queue+0x233/0x290 [ 126.307114] kauditd_thread+0x5da/0x9a0 [ 126.307129] kthread+0x2ed/0x3a0 [ 126.307145] ret_from_fork+0x22/0x30 [ 126.307159] [ 126.307159] -> #0 ((console_sem).lock){....}-{2:2}: [ 126.307173] __lock_acquire+0x2a02/0x5e70 [ 126.307192] lock_acquire+0x1a2/0x530 [ 126.307217] _raw_spin_lock_irqsave+0x39/0x60 [ 126.307230] down_trylock+0xe/0x70 [ 126.307249] __down_trylock_console_sem+0x3b/0xd0 [ 126.307267] vprintk_emit+0x16b/0x560 [ 126.307285] vprintk+0x84/0xa0 [ 126.307302] _printk+0xba/0xf1 [ 126.307315] report_bug.cold+0x72/0xab [ 126.307325] handle_bug+0x3c/0x70 [ 126.307336] exc_invalid_op+0x14/0x50 [ 126.307347] asm_exc_invalid_op+0x16/0x20 [ 126.307361] group_sched_out.part.0+0x2c7/0x460 [ 126.307373] ctx_sched_out+0x8f1/0xc10 [ 126.307384] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.307397] __schedule+0xedd/0x2470 [ 126.307414] schedule+0xda/0x1b0 [ 126.307430] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.307442] syscall_exit_to_user_mode+0x19/0x40 [ 126.307457] do_syscall_64+0x48/0x90 [ 126.307467] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.307483] [ 126.307483] other info that might help us debug this: [ 126.307483] [ 126.307486] Chain exists of: [ 126.307486] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 126.307486] [ 126.307501] Possible unsafe locking scenario: [ 126.307501] [ 126.307504] CPU0 CPU1 [ 126.307506] ---- ---- [ 126.307509] lock(&ctx->lock); [ 126.307515] lock(&rq->__lock); [ 126.307522] lock(&ctx->lock); [ 126.307529] lock((console_sem).lock); [ 126.307535] [ 126.307535] *** DEADLOCK *** [ 126.307535] [ 126.307537] 2 locks held by syz-executor.0/3941: [ 126.307544] #0: ffff88806cf37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 126.307577] #1: ffff88800ebf9c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 126.307607] [ 126.307607] stack backtrace: [ 126.307610] CPU: 1 PID: 3941 Comm: syz-executor.0 Not tainted 6.0.0-rc7-next-20220928 #1 [ 126.307623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.307632] Call Trace: [ 126.307635] [ 126.307640] dump_stack_lvl+0x8b/0xb3 [ 126.307652] check_noncircular+0x263/0x2e0 [ 126.307670] ? format_decode+0x26c/0xb50 [ 126.307690] ? print_circular_bug+0x450/0x450 [ 126.307709] ? enable_ptr_key_workfn+0x20/0x20 [ 126.307730] ? format_decode+0x26c/0xb50 [ 126.307751] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 126.307770] __lock_acquire+0x2a02/0x5e70 [ 126.307794] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 126.307819] lock_acquire+0x1a2/0x530 [ 126.307838] ? down_trylock+0xe/0x70 [ 126.307859] ? lock_release+0x750/0x750 [ 126.307882] ? vprintk+0x84/0xa0 [ 126.307902] _raw_spin_lock_irqsave+0x39/0x60 [ 126.307915] ? down_trylock+0xe/0x70 [ 126.307935] down_trylock+0xe/0x70 [ 126.307955] ? vprintk+0x84/0xa0 [ 126.307974] __down_trylock_console_sem+0x3b/0xd0 [ 126.307993] vprintk_emit+0x16b/0x560 [ 126.308014] vprintk+0x84/0xa0 [ 126.308034] _printk+0xba/0xf1 [ 126.308048] ? record_print_text.cold+0x16/0x16 [ 126.308067] ? report_bug.cold+0x66/0xab [ 126.308079] ? group_sched_out.part.0+0x2c7/0x460 [ 126.308091] report_bug.cold+0x72/0xab [ 126.308104] handle_bug+0x3c/0x70 [ 126.308116] exc_invalid_op+0x14/0x50 [ 126.308128] asm_exc_invalid_op+0x16/0x20 [ 126.308144] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 126.308158] Code: 5e 41 5f e9 cb a9 ef ff e8 c6 a9 ef ff 65 8b 1d db 12 ac 7e 31 ff 89 de e8 66 a6 ef ff 85 db 0f 84 8a 00 00 00 e8 a9 a9 ef ff <0f> 0b e9 a5 fe ff ff e8 9d a9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 126.308170] RSP: 0018:ffff88804044fc48 EFLAGS: 00010006 [ 126.308179] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 126.308187] RDX: ffff88803fca8000 RSI: ffffffff815662f7 RDI: 0000000000000005 [ 126.308196] RBP: ffff888040458000 R08: 0000000000000005 R09: 0000000000000001 [ 126.308204] R10: 0000000000000000 R11: ffffffff865b405b R12: ffff88800ebf9c00 [ 126.308212] R13: ffff88806cf3d140 R14: ffffffff8547cf00 R15: 0000000000000002 [ 126.308223] ? group_sched_out.part.0+0x2c7/0x460 [ 126.308238] ? group_sched_out.part.0+0x2c7/0x460 [ 126.308252] ctx_sched_out+0x8f1/0xc10 [ 126.308266] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.308283] ? lock_is_held_type+0xd7/0x130 [ 126.308300] ? __perf_cgroup_move+0x160/0x160 [ 126.308313] ? set_next_entity+0x304/0x550 [ 126.308333] ? update_curr+0x267/0x740 [ 126.308354] ? lock_is_held_type+0xd7/0x130 [ 126.308371] __schedule+0xedd/0x2470 [ 126.308391] ? io_schedule_timeout+0x150/0x150 [ 126.308412] ? rcu_read_lock_sched_held+0x3e/0x80 [ 126.308435] schedule+0xda/0x1b0 [ 126.308453] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.308466] syscall_exit_to_user_mode+0x19/0x40 [ 126.308483] do_syscall_64+0x48/0x90 [ 126.308495] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.308510] RIP: 0033:0x7f20f0705b19 [ 126.308519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.308530] RSP: 002b:00007f20edc7b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 126.308542] RAX: 0000000000000001 RBX: 00007f20f0818f68 RCX: 00007f20f0705b19 [ 126.308550] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f20f0818f6c [ 126.308557] RBP: 00007f20f0818f60 R08: 000000000000000e R09: 0000000000000000 [ 126.308565] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f20f0818f6c [ 126.308573] R13: 00007ffedcaa2ecf R14: 00007f20edc7b300 R15: 0000000000022000 [ 126.308586] [ 126.363551] WARNING: CPU: 1 PID: 3941 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 126.364226] Modules linked in: [ 126.364465] CPU: 1 PID: 3941 Comm: syz-executor.0 Not tainted 6.0.0-rc7-next-20220928 #1 [ 126.365057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.365869] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 126.366271] Code: 5e 41 5f e9 cb a9 ef ff e8 c6 a9 ef ff 65 8b 1d db 12 ac 7e 31 ff 89 de e8 66 a6 ef ff 85 db 0f 84 8a 00 00 00 e8 a9 a9 ef ff <0f> 0b e9 a5 fe ff ff e8 9d a9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 126.367618] RSP: 0018:ffff88804044fc48 EFLAGS: 00010006 [ 126.368025] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 126.368564] RDX: ffff88803fca8000 RSI: ffffffff815662f7 RDI: 0000000000000005 [ 126.369104] RBP: ffff888040458000 R08: 0000000000000005 R09: 0000000000000001 [ 126.369645] R10: 0000000000000000 R11: ffffffff865b405b R12: ffff88800ebf9c00 [ 126.370189] R13: ffff88806cf3d140 R14: ffffffff8547cf00 R15: 0000000000000002 [ 126.370734] FS: 00007f20edc7b700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 126.371357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 126.371796] CR2: 00007f01f10d2610 CR3: 00000000176fe000 CR4: 0000000000350ee0 [ 126.372340] Call Trace: [ 126.372539] [ 126.372718] ctx_sched_out+0x8f1/0xc10 [ 126.373019] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.373417] ? lock_is_held_type+0xd7/0x130 [ 126.373757] ? __perf_cgroup_move+0x160/0x160 [ 126.374105] ? set_next_entity+0x304/0x550 [ 126.374436] ? update_curr+0x267/0x740 [ 126.374747] ? lock_is_held_type+0xd7/0x130 [ 126.375086] __schedule+0xedd/0x2470 [ 126.375405] ? io_schedule_timeout+0x150/0x150 [ 126.375765] ? rcu_read_lock_sched_held+0x3e/0x80 [ 126.376142] schedule+0xda/0x1b0 [ 126.376418] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.376800] syscall_exit_to_user_mode+0x19/0x40 [ 126.377168] do_syscall_64+0x48/0x90 [ 126.377462] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.377852] RIP: 0033:0x7f20f0705b19 [ 126.378138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.379494] RSP: 002b:00007f20edc7b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 126.380056] RAX: 0000000000000001 RBX: 00007f20f0818f68 RCX: 00007f20f0705b19 [ 126.380599] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f20f0818f6c [ 126.381145] RBP: 00007f20f0818f60 R08: 000000000000000e R09: 0000000000000000 [ 126.381677] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f20f0818f6c [ 126.382214] R13: 00007ffedcaa2ecf R14: 00007f20edc7b300 R15: 0000000000022000 [ 126.382750] [ 126.382928] irq event stamp: 3212 [ 126.383197] hardirqs last enabled at (3211): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 126.383926] hardirqs last disabled at (3212): [] __schedule+0x1225/0x2470 [ 126.384561] softirqs last enabled at (3096): [] __irq_exit_rcu+0x11b/0x180 [ 126.385219] softirqs last disabled at (2799): [] __irq_exit_rcu+0x11b/0x180 [ 126.385873] ---[ end trace 0000000000000000 ]--- [ 126.421127] loop0: detected capacity change from 0 to 5 [ 126.463951] hrtimer: interrupt took 18965 ns [ 126.991810] loop2: detected capacity change from 0 to 5 [ 126.998823] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 127.024275] loop2: detected capacity change from 0 to 5 03:03:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 03:03:45 executing program 4: clock_gettime(0x0, &(0x7f00000012c0)) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001300)) syz_mount_image$ext4(&(0x7f0000008700)='ext2\x00', &(0x7f0000008740)='./file0\x00', 0x0, 0x1, &(0x7f0000008840)=[{&(0x7f0000008780)='Y', 0x1}], 0x0, &(0x7f0000008880)={[{@journal_ioprio}], [{@fowner_lt}]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000008900), 0x0, 0x0) clock_gettime(0x0, 0x0) futex(0x0, 0x1, 0x2, 0x0, &(0x7f0000008bc0)=0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x4000) openat(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000008d40), 0x101382, 0x0) 03:03:45 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:45 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000140)="8f857635", 0x4}], 0x5}}], 0x1, 0x0) [ 127.176445] ext2: Unknown parameter 'fowner<00000000000000000000' 03:03:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000007400)={&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000007440)=0x40) 03:03:45 executing program 6: clock_gettime(0x0, &(0x7f00000012c0)) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001300)) syz_mount_image$ext4(&(0x7f0000008700)='ext2\x00', &(0x7f0000008740)='./file0\x00', 0x0, 0x1, &(0x7f0000008840)=[{&(0x7f0000008780)='Y', 0x1}], 0x0, &(0x7f0000008880)={[{@journal_ioprio}], [{@fowner_lt}]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000008900), 0x0, 0x0) clock_gettime(0x0, 0x0) futex(0x0, 0x1, 0x2, 0x0, &(0x7f0000008bc0)=0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x4000) openat(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000008d40), 0x101382, 0x0) 03:03:45 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) 03:03:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 127.191347] ext2: Unknown parameter 'fowner<00000000000000000000' [ 127.196333] loop0: detected capacity change from 0 to 5 03:03:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000007400)={&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000007440)=0x40) 03:03:45 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000140)="8f857635", 0x4}], 0x5}}], 0x1, 0x0) [ 127.243710] loop2: detected capacity change from 0 to 5 03:03:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 03:03:46 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) 03:03:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000007400)={&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000007440)=0x40) 03:03:46 executing program 6: clock_gettime(0x0, &(0x7f00000012c0)) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001300)) syz_mount_image$ext4(&(0x7f0000008700)='ext2\x00', &(0x7f0000008740)='./file0\x00', 0x0, 0x1, &(0x7f0000008840)=[{&(0x7f0000008780)='Y', 0x1}], 0x0, &(0x7f0000008880)={[{@journal_ioprio}], [{@fowner_lt}]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000008900), 0x0, 0x0) clock_gettime(0x0, 0x0) futex(0x0, 0x1, 0x2, 0x0, &(0x7f0000008bc0)=0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x4000) openat(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000008d40), 0x101382, 0x0) 03:03:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 127.330128] loop2: detected capacity change from 0 to 5 03:03:46 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:46 executing program 4: clock_gettime(0x0, &(0x7f00000012c0)) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001300)) syz_mount_image$ext4(&(0x7f0000008700)='ext2\x00', &(0x7f0000008740)='./file0\x00', 0x0, 0x1, &(0x7f0000008840)=[{&(0x7f0000008780)='Y', 0x1}], 0x0, &(0x7f0000008880)={[{@journal_ioprio}], [{@fowner_lt}]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000008900), 0x0, 0x0) clock_gettime(0x0, 0x0) futex(0x0, 0x1, 0x2, 0x0, &(0x7f0000008bc0)=0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x4000) openat(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000008d40), 0x101382, 0x0) 03:03:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 127.337995] loop0: detected capacity change from 0 to 5 [ 127.341250] ext2: Unknown parameter 'fowner<00000000000000000000' [ 127.369125] loop5: detected capacity change from 0 to 5 [ 127.377854] ext2: Unknown parameter 'fowner<00000000000000000000' 03:03:46 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) 03:03:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 03:03:46 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 6: clock_gettime(0x0, &(0x7f00000012c0)) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001300)) syz_mount_image$ext4(&(0x7f0000008700)='ext2\x00', &(0x7f0000008740)='./file0\x00', 0x0, 0x1, &(0x7f0000008840)=[{&(0x7f0000008780)='Y', 0x1}], 0x0, &(0x7f0000008880)={[{@journal_ioprio}], [{@fowner_lt}]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000008900), 0x0, 0x0) clock_gettime(0x0, 0x0) futex(0x0, 0x1, 0x2, 0x0, &(0x7f0000008bc0)=0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x4000) openat(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000008d40), 0x101382, 0x0) 03:03:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 127.454541] loop1: detected capacity change from 0 to 5 [ 127.456597] loop2: detected capacity change from 0 to 5 [ 127.461531] ext2: Unknown parameter 'fowner<00000000000000000000' 03:03:46 executing program 7: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 127.492104] loop0: detected capacity change from 0 to 5 [ 127.497544] loop5: detected capacity change from 0 to 5 [ 127.505063] loop7: detected capacity change from 0 to 5 [ 127.586266] loop2: detected capacity change from 0 to 5 [ 127.598735] ext2: Unknown parameter 'fowner<00000000000000000000' [ 127.599659] loop0: detected capacity change from 0 to 5 [ 127.601971] loop1: detected capacity change from 0 to 5 [ 127.602829] loop3: detected capacity change from 0 to 5 [ 127.613778] loop6: detected capacity change from 0 to 5 03:03:46 executing program 4: clock_gettime(0x0, &(0x7f00000012c0)) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001300)) syz_mount_image$ext4(&(0x7f0000008700)='ext2\x00', &(0x7f0000008740)='./file0\x00', 0x0, 0x1, &(0x7f0000008840)=[{&(0x7f0000008780)='Y', 0x1}], 0x0, &(0x7f0000008880)={[{@journal_ioprio}], [{@fowner_lt}]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000008900), 0x0, 0x0) clock_gettime(0x0, 0x0) futex(0x0, 0x1, 0x2, 0x0, &(0x7f0000008bc0)=0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x4000) openat(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000008d40), 0x101382, 0x0) 03:03:46 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 6: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 7: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) [ 127.635325] loop5: detected capacity change from 0 to 5 [ 127.644634] loop7: detected capacity change from 0 to 5 perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 6: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 127.701364] loop4: detected capacity change from 0 to 5 03:03:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 127.733551] loop2: detected capacity change from 0 to 5 [ 127.738232] loop6: detected capacity change from 0 to 5 [ 127.764465] loop0: detected capacity change from 0 to 5 [ 127.766571] loop1: detected capacity change from 0 to 5 [ 127.770590] loop3: detected capacity change from 0 to 5 [ 127.990591] loop4: detected capacity change from 0 to 5 03:03:46 executing program 7: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:46 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:46 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 127.995820] loop2: detected capacity change from 0 to 5 [ 128.001373] loop6: detected capacity change from 0 to 5 03:03:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:03:46 executing program 6: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00') fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 128.031505] loop1: detected capacity change from 0 to 5 [ 128.035862] loop7: detected capacity change from 0 to 5 [ 128.053178] loop5: detected capacity change from 0 to 5 [ 128.062222] loop3: detected capacity change from 0 to 5 [ 128.104258] loop0: detected capacity change from 0 to 5 03:03:46 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:46 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:46 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 128.163122] loop6: detected capacity change from 0 to 5 03:03:46 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:46 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 128.285248] loop5: detected capacity change from 0 to 5 [ 128.286618] loop7: detected capacity change from 0 to 5 03:03:46 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 128.288699] loop1: detected capacity change from 0 to 5 [ 128.295131] loop4: detected capacity change from 0 to 5 [ 128.323646] loop6: detected capacity change from 0 to 5 [ 128.333699] loop3: detected capacity change from 0 to 5 03:03:47 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:47 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:47 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 128.419378] loop2: detected capacity change from 0 to 5 [ 128.434703] loop4: detected capacity change from 0 to 5 03:03:47 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:47 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 128.466148] loop6: detected capacity change from 0 to 5 03:03:47 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 03:03:47 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 128.484299] loop3: detected capacity change from 0 to 5 [ 128.499387] loop0: detected capacity change from 0 to 5 [ 128.551444] loop2: detected capacity change from 0 to 5 03:03:47 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, VM DIAGNOSIS: 03:03:45 Registers: info registers vcpu 0 RAX=1ffffffff0b777a2 RBX=ffffffff85bbbd10 RCX=ffffffff81783136 RDX=0000000000000000 RSI=ffffffff85edfcfc RDI=ffffffff85bbbd08 RBP=ffffffff85bbbd08 RSP=ffff8880403675a0 R8 =ffffffff85edfcfc R9 =ffffffff85ee034e R10=ffffed100806ceda R11=000000000003603d R12=ffffffff85bbbd18 R13=ffffffff85bbbd08 R14=ffffffff85bbbd08 R15=dffffc0000000000 RIP=ffffffff81119b6f RFL=00000212 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9c6bcab6f4 CR3=00000000187b6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffff00 ffffffffffffffff YMM02=0000000000000000 0000000000000000 203a353152203030 3362376364653032 YMM03=0000000000000000 0000000000000000 6161636465666637 30303030203a3331 YMM04=0000000000000000 0000000000000000 6620666620666620 6666206362203163 YMM05=0000000000000000 0000000000000000 6666206666203066 203130206433203e YMM06=0000000000000000 0000000000000000 6334206238206334 2038632039382064 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 3030303030203a35 3152203030336237 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=000000000000002f RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823ba131 RDI=ffffffff8765a980 RBP=ffffffff8765a940 RSP=ffff88804044f690 R8 =0000000000000001 R9 =000000000000000a R10=000000000000002f R11=0000000000000001 R12=000000000000002f R13=ffffffff8765a940 R14=0000000000000010 R15=ffffffff823ba120 RIP=ffffffff823ba189 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f20edc7b700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f01f10d2610 CR3=00000000176fe000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 38313d72656e776f 662c73746f646f6e YMM01=0000000000000000 0000000000000000 3631353539303733 3730343437363434 YMM02=0000000000000000 0000000000000000 6a626f2c3d657079 745f6a626f2c3531 YMM03=0000000000000000 0000000000000000 65746e6f632c5b2e cb273d656c6f725f YMM04=0000000000000000 0000000000000000 2c40292b2a3d7461 6873666b63616d73 YMM05=0000000000000000 0000000000000000 2c38323930363030 3030303030303030 YMM06=0000000000000000 0000000000000000 30303030303d6469 752c746f6f723d74 YMM07=0000000000000000 0000000000000000 7865746e6f632c5b 2ecb273d656c6f72 YMM08=0000000000000000 0000000000000000 92eb12d48b7ea51c 2bab3ae632fa2f91 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000