hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(0xffffffffffffffff, 0x5) 00:25:27 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:25:27 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:25:27 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:25:27 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 215.186582] loop0: detected capacity change from 0 to 7 [ 215.193708] loop7: detected capacity change from 0 to 7 [ 215.197014] loop1: detected capacity change from 0 to 7 [ 215.200237] loop3: detected capacity change from 0 to 7 00:25:27 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) [ 215.222065] loop4: detected capacity change from 0 to 7 [ 215.257618] loop2: detected capacity change from 0 to 7 [ 215.269857] blk_print_req_error: 7 callbacks suppressed [ 215.269867] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 215.270994] Buffer I/O error on dev loop2, logical block 0, async page read [ 215.271719] loop2: unable to read partition table [ 215.297457] loop2: partition table beyond EOD, truncated [ 215.580514] syz-executor.5: attempt to access beyond end of device [ 215.580514] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 215.581991] Buffer I/O error on dev loop5, logical block 10, lost async page write [ 216.496995] Bluetooth: hci4: command 0x0406 tx timeout [ 216.497142] Bluetooth: hci5: command 0x0406 tx timeout [ 216.498073] Bluetooth: hci3: command 0x0406 tx timeout [ 216.498701] Bluetooth: hci6: command 0x0406 tx timeout [ 216.500413] Bluetooth: hci0: command 0x0406 tx timeout [ 216.501161] Bluetooth: hci1: command 0x0406 tx timeout [ 216.501878] Bluetooth: hci2: command 0x0406 tx timeout [ 216.502653] Bluetooth: hci7: command 0x0406 tx timeout 00:25:42 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) 00:25:42 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:25:42 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:25:42 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:25:42 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) 00:25:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) 00:25:42 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:25:42 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 230.459218] loop3: detected capacity change from 0 to 7 [ 230.464625] loop4: detected capacity change from 0 to 7 [ 230.470627] loop2: detected capacity change from 0 to 7 [ 230.474218] loop0: detected capacity change from 0 to 7 [ 230.475649] loop7: detected capacity change from 0 to 7 [ 230.476999] loop1: detected capacity change from 0 to 7 [ 230.478685] loop5: detected capacity change from 0 to 40 00:25:42 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:25:42 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:25:42 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) 00:25:42 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) 00:25:42 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:25:42 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:25:42 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 230.774423] loop7: detected capacity change from 0 to 7 [ 230.780151] loop2: detected capacity change from 0 to 7 00:25:42 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) [ 230.797811] loop4: detected capacity change from 0 to 7 [ 230.805031] loop0: detected capacity change from 0 to 7 [ 230.846641] loop3: detected capacity change from 0 to 7 [ 230.861843] loop1: detected capacity change from 0 to 7 00:25:42 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:25:42 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:25:42 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:25:42 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:25:42 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 231.063528] loop4: detected capacity change from 0 to 7 [ 231.074589] loop2: detected capacity change from 0 to 7 [ 231.080954] loop7: detected capacity change from 0 to 7 [ 231.165394] loop0: detected capacity change from 0 to 7 00:25:56 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:25:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) 00:25:56 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:25:56 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:25:56 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:25:56 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:25:56 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:25:56 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 244.238534] loop3: detected capacity change from 0 to 7 [ 244.243558] loop0: detected capacity change from 0 to 7 [ 244.246786] loop7: detected capacity change from 0 to 7 [ 244.252499] loop2: detected capacity change from 0 to 7 [ 244.254093] loop5: detected capacity change from 0 to 40 [ 244.276529] loop4: detected capacity change from 0 to 7 [ 244.280367] loop1: detected capacity change from 0 to 7 00:25:56 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 244.461662] loop3: detected capacity change from 0 to 7 00:25:56 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:25:56 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:25:56 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:25:56 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:25:56 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:25:56 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 244.527265] loop7: detected capacity change from 0 to 7 [ 244.602442] loop2: detected capacity change from 0 to 7 00:25:56 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 244.625428] loop0: detected capacity change from 0 to 7 [ 244.632687] loop4: detected capacity change from 0 to 7 00:25:56 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) [ 244.708104] loop7: detected capacity change from 0 to 7 [ 244.772409] loop1: detected capacity change from 0 to 7 [ 245.106289] syz-executor.5 (4431) used greatest stack depth: 23568 bytes left 00:26:09 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:09 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) [ 257.822259] loop3: detected capacity change from 0 to 7 00:26:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:26:09 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:26:09 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) [ 257.837625] loop5: detected capacity change from 0 to 40 [ 257.840770] loop7: detected capacity change from 0 to 7 [ 257.851538] loop1: detected capacity change from 0 to 7 [ 257.875246] loop2: detected capacity change from 0 to 7 [ 257.883298] loop4: detected capacity change from 0 to 7 [ 257.890841] loop0: detected capacity change from 0 to 7 00:26:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:26:09 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:09 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) 00:26:09 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:26:09 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) 00:26:09 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r2, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r2, 0x5) [ 258.000103] loop3: detected capacity change from 0 to 7 [ 258.002262] loop1: detected capacity change from 0 to 7 00:26:09 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 258.009601] loop7: detected capacity change from 0 to 7 00:26:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:26:09 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) [ 258.093041] syz-executor.5: attempt to access beyond end of device [ 258.093041] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 258.094271] Buffer I/O error on dev loop5, logical block 10, lost async page write [ 258.131103] loop1: detected capacity change from 0 to 7 [ 258.145664] loop2: detected capacity change from 0 to 7 00:26:22 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r2, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r2, 0x5) 00:26:22 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:26:22 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:22 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:26:22 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:22 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:26:22 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 271.061766] loop4: detected capacity change from 0 to 7 [ 271.068108] loop5: detected capacity change from 0 to 40 [ 271.068754] loop3: detected capacity change from 0 to 7 [ 271.071794] loop1: detected capacity change from 0 to 7 [ 271.075469] loop7: detected capacity change from 0 to 7 [ 271.091315] loop0: detected capacity change from 0 to 7 [ 271.132299] loop2: detected capacity change from 0 to 7 00:26:23 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:23 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:26:23 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r1, 0x5) [ 271.270523] loop0: detected capacity change from 0 to 7 00:26:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) [ 271.274471] loop7: detected capacity change from 0 to 7 00:26:23 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 271.291505] syz-executor.5: attempt to access beyond end of device [ 271.291505] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 271.292637] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:26:23 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:26:23 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 271.351504] loop3: detected capacity change from 0 to 7 00:26:23 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 271.368979] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 271.369047] loop2: detected capacity change from 0 to 7 [ 271.370279] Buffer I/O error on dev loop3, logical block 0, async page read [ 271.371717] loop3: unable to read partition table [ 271.377824] loop1: detected capacity change from 0 to 7 [ 271.385537] loop3: partition table beyond EOD, truncated [ 271.398568] loop4: detected capacity change from 0 to 7 [ 271.419530] loop0: detected capacity change from 0 to 7 00:26:35 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:26:35 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r1, 0x5) 00:26:35 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:26:35 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:26:35 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:35 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:26:35 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 283.217026] loop1: detected capacity change from 0 to 7 [ 283.220446] loop4: detected capacity change from 0 to 7 [ 283.222459] loop5: detected capacity change from 0 to 40 [ 283.225132] loop2: detected capacity change from 0 to 7 [ 283.248251] loop0: detected capacity change from 0 to 7 [ 283.250315] loop3: detected capacity change from 0 to 7 [ 283.254577] loop7: detected capacity change from 0 to 7 00:26:35 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:35 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:26:35 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:26:35 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) [ 283.383050] loop1: detected capacity change from 0 to 7 [ 283.386070] loop2: detected capacity change from 0 to 7 [ 283.391503] loop4: detected capacity change from 0 to 7 00:26:35 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:26:35 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) [ 283.477814] syz-executor.5: attempt to access beyond end of device [ 283.477814] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 283.480523] Buffer I/O error on dev loop5, logical block 10, lost async page write [ 283.494743] loop3: detected capacity change from 0 to 7 [ 283.510109] loop2: detected capacity change from 0 to 7 00:26:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r1, 0x5) 00:26:47 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:26:47 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) [ 296.037698] loop3: detected capacity change from 0 to 7 [ 296.040164] loop1: detected capacity change from 0 to 7 [ 296.041511] loop7: detected capacity change from 0 to 7 00:26:47 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:26:47 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:26:47 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 296.044143] loop2: detected capacity change from 0 to 7 00:26:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 296.054295] loop5: detected capacity change from 0 to 40 [ 296.054459] loop4: detected capacity change from 0 to 7 [ 296.083659] loop0: detected capacity change from 0 to 7 00:26:48 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:26:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r1, 0x5) 00:26:48 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:26:48 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) [ 296.189681] loop7: detected capacity change from 0 to 7 [ 296.191665] loop2: detected capacity change from 0 to 7 00:26:48 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 296.210873] loop4: detected capacity change from 0 to 7 [ 296.259723] loop0: detected capacity change from 0 to 7 00:26:48 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:26:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:26:48 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) [ 296.318980] loop3: detected capacity change from 0 to 7 [ 296.333315] loop7: detected capacity change from 0 to 7 [ 296.336868] loop2: detected capacity change from 0 to 7 00:26:48 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:26:48 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, 0x0, 0x0) 00:26:48 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:26:48 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:26:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:26:48 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) [ 296.470018] loop1: detected capacity change from 0 to 7 [ 296.484263] loop2: detected capacity change from 0 to 7 [ 296.530375] loop4: detected capacity change from 0 to 7 [ 296.630535] syz-executor.5: attempt to access beyond end of device [ 296.630535] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 296.631822] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:27:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:27:00 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 308.982689] loop5: detected capacity change from 0 to 40 00:27:00 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:00 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:27:00 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:27:00 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:00 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, 0x0, 0x0) 00:27:00 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) [ 309.027795] loop0: detected capacity change from 0 to 7 [ 309.035082] loop1: detected capacity change from 0 to 7 [ 309.070858] loop4: detected capacity change from 0 to 7 [ 309.101683] syz-executor.5: attempt to access beyond end of device [ 309.101683] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 309.103263] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:27:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:27:01 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 309.167248] loop1: detected capacity change from 0 to 7 00:27:13 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:27:13 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, 0x0, 0x0) 00:27:13 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:13 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:13 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:27:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:27:13 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:27:13 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 321.543569] loop1: detected capacity change from 0 to 7 [ 321.566503] loop4: detected capacity change from 0 to 7 [ 321.592165] loop0: detected capacity change from 0 to 7 [ 321.597027] loop5: detected capacity change from 0 to 40 00:27:13 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:27:13 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:27:13 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 321.751517] loop4: detected capacity change from 0 to 7 00:27:13 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140), 0xc) [ 321.760121] loop1: detected capacity change from 0 to 7 00:27:13 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:27:13 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:13 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 321.899666] loop4: detected capacity change from 0 to 7 00:27:13 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:27:13 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140), 0xc) [ 321.940322] loop1: detected capacity change from 0 to 7 00:27:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 322.003694] loop0: detected capacity change from 0 to 7 00:27:13 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:13 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:13 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 322.114329] loop3: detected capacity change from 0 to 7 [ 322.406704] syz-executor.5: attempt to access beyond end of device [ 322.406704] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 322.408951] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:27:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:27:27 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:27:27 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:27:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:27 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:27 executing program 3: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:27 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140), 0xc) [ 335.733856] loop5: detected capacity change from 0 to 40 00:27:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 335.743368] loop3: detected capacity change from 0 to 7 [ 335.750348] loop1: detected capacity change from 0 to 7 [ 335.775466] loop0: detected capacity change from 0 to 7 00:27:27 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140), 0xc) 00:27:27 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 335.886250] loop3: detected capacity change from 0 to 7 [ 335.899680] syz-executor.5: attempt to access beyond end of device [ 335.899680] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 335.900739] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:27:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:27:41 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:41 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:27:41 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:41 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:27:41 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) [ 349.790596] loop5: detected capacity change from 0 to 40 [ 349.813058] loop0: detected capacity change from 0 to 7 [ 349.853242] loop3: detected capacity change from 0 to 7 [ 349.855050] loop1: detected capacity change from 0 to 7 00:27:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:41 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:27:41 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 349.963752] loop0: detected capacity change from 0 to 7 00:27:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 349.989072] syz-executor.5: attempt to access beyond end of device [ 349.989072] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 349.990222] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:27:41 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:27:41 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:27:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:27:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:41 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 350.098297] loop0: detected capacity change from 0 to 7 [ 350.153472] loop5: detected capacity change from 0 to 40 00:27:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:27:42 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:42 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:42 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:27:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 350.200293] loop1: detected capacity change from 0 to 7 [ 350.209501] loop4: detected capacity change from 0 to 7 [ 350.235190] loop0: detected capacity change from 0 to 7 [ 350.244461] loop3: detected capacity change from 0 to 7 00:27:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:42 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:27:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 350.353299] loop0: detected capacity change from 0 to 7 [ 350.365560] syz-executor.5: attempt to access beyond end of device [ 350.365560] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 350.367400] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:27:42 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:42 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 350.433386] loop4: detected capacity change from 0 to 7 00:27:42 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) [ 350.468272] loop3: detected capacity change from 0 to 7 00:27:55 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:27:55 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:27:55 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:27:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:27:55 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:55 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) [ 363.871820] loop4: detected capacity change from 0 to 7 [ 363.894747] loop3: detected capacity change from 0 to 7 [ 363.897545] loop1: detected capacity change from 0 to 7 [ 363.909157] loop5: detected capacity change from 0 to 40 00:27:55 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) 00:27:55 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:27:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 364.120735] loop3: detected capacity change from 0 to 7 [ 364.203009] syz-executor.5: attempt to access beyond end of device [ 364.203009] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 364.205257] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:28:07 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:07 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:28:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:28:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:28:08 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:08 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 376.142421] loop4: detected capacity change from 0 to 7 [ 376.143863] loop5: detected capacity change from 0 to 40 [ 376.169740] loop1: detected capacity change from 0 to 7 00:28:08 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:28:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:08 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 376.255735] loop4: detected capacity change from 0 to 7 00:28:08 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:08 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:08 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:28:08 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 376.424517] loop1: detected capacity change from 0 to 7 [ 376.449179] syz-executor.5: attempt to access beyond end of device [ 376.449179] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 376.460761] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:28:23 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:28:23 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:28:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:28:23 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:23 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:23 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 391.800759] loop5: detected capacity change from 0 to 40 [ 391.812812] loop4: detected capacity change from 0 to 7 [ 391.822170] loop1: detected capacity change from 0 to 7 00:28:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:23 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:28:23 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 392.046301] loop1: detected capacity change from 0 to 7 00:28:23 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:23 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:24 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:28:24 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 392.190551] loop4: detected capacity change from 0 to 7 00:28:24 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 392.613476] syz-executor.5: attempt to access beyond end of device [ 392.613476] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 392.614653] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:28:36 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:36 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:36 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:36 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:28:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 404.979228] loop4: detected capacity change from 0 to 7 00:28:36 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 405.041191] loop5: detected capacity change from 0 to 40 00:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:36 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:37 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:28:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:37 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 405.191752] perf: interrupt took too long (4051 > 4027), lowering kernel.perf_event_max_sample_rate to 49000 [ 405.194561] perf: interrupt took too long (6401 > 6373), lowering kernel.perf_event_max_sample_rate to 31000 [ 405.195812] perf: interrupt took too long (8058 > 8001), lowering kernel.perf_event_max_sample_rate to 24000 00:28:37 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 405.240733] perf: interrupt took too long (10076 > 10072), lowering kernel.perf_event_max_sample_rate to 19000 [ 405.305670] syz-executor.5: attempt to access beyond end of device [ 405.305670] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 405.307795] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:28:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:28:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 419.185216] loop5: detected capacity change from 0 to 40 00:28:51 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:51 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:51 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:28:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:51 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:28:51 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:28:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:28:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 419.403624] syz-executor.5: attempt to access beyond end of device [ 419.403624] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 419.405718] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:29:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:29:04 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:29:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:29:04 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:04 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 432.569279] loop5: detected capacity change from 0 to 40 00:29:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:04 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 432.697333] syz-executor.5: attempt to access beyond end of device [ 432.697333] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 432.698504] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:29:17 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:29:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:29:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:17 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:29:17 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 445.192696] loop5: detected capacity change from 0 to 40 [ 445.211760] perf: interrupt took too long (12601 > 12595), lowering kernel.perf_event_max_sample_rate to 15000 00:29:17 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:17 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 445.278489] perf: interrupt took too long (15753 > 15751), lowering kernel.perf_event_max_sample_rate to 12000 00:29:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:29:17 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:17 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:17 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 445.381016] syz-executor.5: attempt to access beyond end of device [ 445.381016] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 445.382738] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:29:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:29:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:29:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:29:32 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:29:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:29:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 460.189348] loop5: detected capacity change from 0 to 40 00:29:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 460.281218] syz-executor.5: attempt to access beyond end of device [ 460.281218] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 460.283104] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:29:32 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:29:32 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:29:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 460.574796] loop5: detected capacity change from 0 to 40 [ 460.657751] syz-executor.5: attempt to access beyond end of device [ 460.657751] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 460.659612] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:29:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:29:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:29:46 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:29:46 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 474.869715] loop5: detected capacity change from 0 to 40 00:29:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:29:46 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:46 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 475.050383] syz-executor.5: attempt to access beyond end of device [ 475.050383] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 475.052504] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:29:59 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:59 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:29:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:29:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:59 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:29:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 488.128936] loop5: detected capacity change from 0 to 40 00:30:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:30:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 488.201785] syz-executor.5: attempt to access beyond end of device [ 488.201785] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 488.202847] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:30:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:30:00 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:00 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:00 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:30:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 488.345531] loop5: detected capacity change from 0 to 40 00:30:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 488.495075] syz-executor.5: attempt to access beyond end of device [ 488.495075] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 488.497156] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:30:12 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:30:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:30:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:12 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:12 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:30:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 500.891092] loop5: detected capacity change from 0 to 40 00:30:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 501.035352] syz-executor.5: attempt to access beyond end of device [ 501.035352] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 501.037287] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:30:24 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:30:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:30:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:30:24 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 512.842279] loop5: detected capacity change from 0 to 40 [ 512.864710] syz-executor.5: attempt to access beyond end of device [ 512.864710] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 512.866016] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:30:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:30:24 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 512.958739] loop5: detected capacity change from 0 to 40 [ 513.023466] syz-executor.5: attempt to access beyond end of device [ 513.023466] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 513.024622] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:30:24 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:30:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:30:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:30:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:30:25 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 513.237115] perf: interrupt took too long (19771 > 19691), lowering kernel.perf_event_max_sample_rate to 10000 [ 514.036104] syz-executor.5 (5328) used greatest stack depth: 23344 bytes left 00:30:37 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:30:37 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 526.128370] loop5: detected capacity change from 0 to 40 00:30:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:30:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:30:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:30:38 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:38 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) flock(r0, 0x5) [ 526.208005] syz-executor.5: attempt to access beyond end of device [ 526.208005] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 526.209170] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:30:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:30:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:30:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:38 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:38 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:30:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:30:38 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 526.370706] loop5: detected capacity change from 0 to 40 [ 526.419679] syz-executor.5: attempt to access beyond end of device [ 526.419679] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 526.420789] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:30:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:49 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 537.859214] loop5: detected capacity change from 0 to 40 00:30:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(0xffffffffffffffff, 0x5) 00:30:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:30:49 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:49 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:30:49 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 537.919738] syz-executor.5: attempt to access beyond end of device [ 537.919738] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 537.920798] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:30:49 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:49 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:30:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:30:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:30:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(0xffffffffffffffff, 0x5) [ 538.067111] loop5: detected capacity change from 0 to 40 [ 538.122065] syz-executor.5: attempt to access beyond end of device [ 538.122065] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 538.123264] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:31:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:03 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:31:03 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 551.481708] loop5: detected capacity change from 0 to 40 00:31:03 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x0) 00:31:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:03 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 551.643540] syz-executor.5: attempt to access beyond end of device [ 551.643540] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 551.645557] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:31:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:31:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:31:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x0) 00:31:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:16 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:16 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:31:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:31:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:31:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) [ 564.295595] loop5: detected capacity change from 0 to 40 00:31:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x0) 00:31:16 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:31:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:31:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:16 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) [ 564.432429] syz-executor.5: attempt to access beyond end of device [ 564.432429] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 564.434534] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:31:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:31:29 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 577.955224] loop5: detected capacity change from 0 to 40 00:31:29 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:31:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) [ 578.086734] syz-executor.5: attempt to access beyond end of device [ 578.086734] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 578.088558] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:31:30 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:30 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:31:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 579.113196] syz-executor.5 (5541) used greatest stack depth: 22896 bytes left 00:31:43 executing program 7: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:31:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:31:43 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 592.043604] loop2: detected capacity change from 0 to 40 00:31:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:31:43 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:31:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 592.098786] loop5: detected capacity change from 0 to 40 00:31:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:31:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:31:44 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 592.158160] loop7: detected capacity change from 0 to 40 [ 592.238595] syz-executor.2: attempt to access beyond end of device [ 592.238595] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 592.240777] Buffer I/O error on dev loop2, logical block 10, lost async page write [ 592.245314] syz-executor.7: attempt to access beyond end of device [ 592.245314] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 592.246574] Buffer I/O error on dev loop7, logical block 10, lost async page write 00:31:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:31:58 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:58 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:58 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:31:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 606.926670] loop5: detected capacity change from 0 to 40 [ 606.936650] loop7: detected capacity change from 0 to 40 00:31:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:31:58 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:31:58 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:31:58 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:31:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:31:58 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:31:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 607.134316] syz-executor.7: attempt to access beyond end of device [ 607.134316] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 607.136188] Buffer I/O error on dev loop7, logical block 10, lost async page write [ 607.183835] loop5: detected capacity change from 0 to 40 00:32:10 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:32:10 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:32:10 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) [ 618.870389] loop5: detected capacity change from 0 to 40 00:32:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:32:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:32:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:32:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:32:10 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:32:10 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:32:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:32:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:10 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x5) 00:32:10 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:32:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:32:10 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 619.032214] loop5: detected capacity change from 0 to 40 00:32:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:10 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) [ 619.078012] loop2: detected capacity change from 0 to 40 [ 619.182437] syz-executor.2: attempt to access beyond end of device [ 619.182437] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 619.183523] Buffer I/O error on dev loop2, logical block 10, lost async page write 00:32:25 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) 00:32:25 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:32:25 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:32:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:32:25 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:32:25 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:32:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:25 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 633.280363] loop1: detected capacity change from 0 to 7 00:32:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 633.311963] loop5: detected capacity change from 0 to 40 [ 633.315082] loop3: detected capacity change from 0 to 7 00:32:25 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:32:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:32:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:32:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:25 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:32:25 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x5) [ 633.492935] loop5: detected capacity change from 0 to 40 [ 633.553680] syz-executor.5: attempt to access beyond end of device [ 633.553680] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 633.554694] Buffer I/O error on dev loop5, logical block 10, lost async page write [ 646.638142] loop2: detected capacity change from 0 to 40 [ 646.641245] loop5: detected capacity change from 0 to 40 00:32:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:32:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:38 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:32:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:38 executing program 7: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:32:38 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:32:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:32:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 646.685265] loop1: detected capacity change from 0 to 40 [ 646.695667] syz-executor.5: attempt to access beyond end of device [ 646.695667] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 646.696196] loop6: detected capacity change from 0 to 7 [ 646.696828] Buffer I/O error on dev loop5, logical block 10, lost async page write [ 646.707438] syz-executor.2: attempt to access beyond end of device [ 646.707438] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 646.708479] Buffer I/O error on dev loop2, logical block 10, lost async page write [ 646.729195] loop7: detected capacity change from 0 to 7 [ 646.747133] syz-executor.1: attempt to access beyond end of device [ 646.747133] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 646.748207] Buffer I/O error on dev loop1, logical block 10, lost async page write 00:32:38 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 646.815429] loop2: detected capacity change from 0 to 7 00:32:38 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:32:38 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:32:38 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:32:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:32:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 646.892765] loop6: detected capacity change from 0 to 7 [ 646.895710] loop1: detected capacity change from 0 to 7 00:32:38 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:32:38 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:32:38 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:32:38 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 646.981372] loop5: detected capacity change from 0 to 40 00:32:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 647.016840] loop7: detected capacity change from 0 to 7 [ 647.022986] loop1: detected capacity change from 0 to 7 [ 647.137364] syz-executor.5: attempt to access beyond end of device [ 647.137364] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 647.140120] Buffer I/O error on dev loop5, logical block 10, lost async page write 00:32:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:32:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:52 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x0) 00:32:52 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:32:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) 00:32:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:32:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:52 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) [ 660.715015] loop5: detected capacity change from 0 to 40 [ 660.720718] loop2: detected capacity change from 0 to 40 [ 660.760109] loop7: detected capacity change from 0 to 7 [ 660.763587] loop6: detected capacity change from 0 to 7 00:32:52 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) [ 660.803141] syz-executor.2: attempt to access beyond end of device [ 660.803141] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 660.804306] Buffer I/O error on dev loop2, logical block 10, lost async page write 00:32:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:32:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:32:52 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:32:52 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 660.919993] loop5: detected capacity change from 0 to 40 [ 660.926367] loop3: detected capacity change from 0 to 7 [ 660.938835] loop4: detected capacity change from 0 to 7 [ 673.133554] loop4: detected capacity change from 0 to 7 00:33:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:33:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r1, 0x5) 00:33:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:33:05 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:33:05 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) 00:33:05 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r1, 0x5) 00:33:05 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r1, 0x5) 00:33:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 673.161752] loop7: detected capacity change from 0 to 7 [ 673.165251] loop2: detected capacity change from 0 to 40 [ 673.167486] loop1: detected capacity change from 0 to 7 [ 673.170017] loop6: detected capacity change from 0 to 7 [ 673.184438] loop5: detected capacity change from 0 to 40 00:33:05 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:33:05 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 673.232302] loop3: detected capacity change from 0 to 7 [ 673.243327] syz-executor.2: attempt to access beyond end of device [ 673.243327] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 673.244488] Buffer I/O error on dev loop2, logical block 10, lost async page write 00:33:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 673.272155] loop1: detected capacity change from 0 to 7 00:33:05 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400f0}, 0xc) 00:33:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 673.355779] loop4: detected capacity change from 0 to 7 00:33:05 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:33:05 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:33:05 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) 00:33:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x0, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 673.402731] loop6: detected capacity change from 0 to 7 [ 673.425344] loop2: detected capacity change from 0 to 40 00:33:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 673.446717] loop1: detected capacity change from 0 to 7 [ 673.466383] loop3: detected capacity change from 0 to 7 00:33:05 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 673.506590] loop5: detected capacity change from 0 to 40 [ 673.596542] loop7: detected capacity change from 0 to 7 [ 673.638656] syz-executor.2: attempt to access beyond end of device [ 673.638656] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 673.641219] Buffer I/O error on dev loop2, logical block 10, lost async page write [ 688.231162] loop5: detected capacity change from 0 to 40 [ 688.245359] loop2: detected capacity change from 0 to 40 [ 688.248013] loop7: detected capacity change from 0 to 7 [ 688.250352] loop6: detected capacity change from 0 to 7 [ 688.256331] loop4: detected capacity change from 0 to 7 00:33:20 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:33:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x0, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:33:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:33:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) 00:33:20 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:33:20 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r2, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r2, 0x5) 00:33:20 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:33:20 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 688.291631] loop3: detected capacity change from 0 to 7 [ 688.328136] loop1: detected capacity change from 0 to 7 00:33:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x0, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:33:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 688.392014] syz-executor.2: attempt to access beyond end of device [ 688.392014] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 688.393015] Buffer I/O error on dev loop2, logical block 10, lost async page write 00:33:20 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r2, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r2, 0x5) [ 688.457702] loop6: detected capacity change from 0 to 7 [ 688.489432] loop4: detected capacity change from 0 to 40 [ 688.579796] syz-executor.4: attempt to access beyond end of device [ 688.579796] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 688.580979] Buffer I/O error on dev loop4, logical block 10, lost async page write [ 689.120216] syz-executor.5 (5845) used greatest stack depth: 22832 bytes left [ 708.409543] loop1: detected capacity change from 0 to 7 [ 708.426396] loop4: detected capacity change from 0 to 40 00:33:40 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:33:40 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r2, 0x5) 00:33:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:33:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:33:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) 00:33:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x0, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:33:40 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r2, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r2, 0x5) 00:33:40 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) [ 708.439308] loop6: detected capacity change from 0 to 7 [ 708.470790] loop2: detected capacity change from 0 to 40 [ 708.477787] loop5: detected capacity change from 0 to 40 [ 708.479806] loop3: detected capacity change from 0 to 7 [ 708.482100] loop7: detected capacity change from 0 to 7 00:33:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x0, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:33:40 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:33:40 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 708.610733] syz-executor.4: attempt to access beyond end of device [ 708.610733] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 708.611997] Buffer I/O error on dev loop4, logical block 10, lost async page write [ 708.613921] loop1: detected capacity change from 0 to 7 00:33:40 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) [ 708.630780] syz-executor.2: attempt to access beyond end of device [ 708.630780] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 708.632630] Buffer I/O error on dev loop2, logical block 10, lost async page write 00:33:40 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:33:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x0, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 708.692527] loop7: detected capacity change from 0 to 7 [ 708.697390] loop6: detected capacity change from 0 to 7 [ 708.700076] loop3: detected capacity change from 0 to 7 00:33:40 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 708.856797] loop1: detected capacity change from 0 to 7 [ 721.754778] loop2: detected capacity change from 0 to 40 [ 721.757590] loop1: detected capacity change from 0 to 40 00:33:53 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x5) 00:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:33:53 executing program 5: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:33:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) 00:33:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) 00:33:53 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) 00:33:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0x0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 721.775818] loop6: detected capacity change from 0 to 7 [ 721.776549] loop3: detected capacity change from 0 to 7 [ 721.790702] loop7: detected capacity change from 0 to 7 [ 721.801336] loop4: detected capacity change from 0 to 7 00:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(0xffffffffffffffff, 0x5) 00:33:53 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r3, 0x5) [ 721.895154] syz-executor.1: attempt to access beyond end of device [ 721.895154] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 721.897096] Buffer I/O error on dev loop1, logical block 10, lost async page write [ 721.936363] syz-executor.2: attempt to access beyond end of device [ 721.936363] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 721.938218] Buffer I/O error on dev loop2, logical block 10, lost async page write 00:33:53 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) [ 721.954264] loop7: detected capacity change from 0 to 7 00:33:53 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) [ 721.991404] loop3: detected capacity change from 0 to 7 00:33:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0x0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:33:53 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) 00:33:53 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 722.038398] loop1: detected capacity change from 0 to 7 [ 722.062674] loop7: detected capacity change from 0 to 7 00:33:53 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 722.089530] loop4: detected capacity change from 0 to 7 00:33:53 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x4, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="b410e908e9b03c35207dc626432f39554f2968f69845b6a8117f14f0e11ad384f61068665b6850ff78e50b3e7fdb6d79786b418e6d7c652ad1e3d9102a9725dfcb0dc67b71e8a977e69772eb1d65dcab1c258e1ac5fb33dcbac98e7b4ef02959b57f76585515106442cdc47c8a4e1eaa61bb124863db434c", 0x78, 0x5}, {&(0x7f00000003c0)="128f3000ce7b91b05972b701760f6b546af5ef3d60e84f05304d00e9b691305685b7a3b38db1fa88b5dd797007317b373b6d400b8ef92b50fddb6a2411", 0x3d, 0x8}, {&(0x7f0000000400)="994f4e2b15591f7bf46f3c78fc5e7b0c1614b38be3b3a2974f99505762d97bcf65113d99612c0ded5c262ed55fb34da38130491943861b9a323973e915ffdf197e4bc563f304d5af581514831172b354cddc6188caa8fa9ffc69c30d5a8dd3a3ad19579d4b99e95860c7901bbaf31b2f08a2a550cb3c7f487d06db592036ff57d0fe09ab78f9c10d7c63", 0x8a, 0x7ff}, {&(0x7f00000004c0)="be61e6a811538febf5c4c2baa414eca2b9688906ba832ffae6892e9760a2135e58632ee14dc343b3811ab1db7830048a799499887914a58198d3c7314399bdb60fa4146bbe06c3e7c53d8c1aef878a417cdeeeae594b660018fa3e3194a349c4922e163033122269452acce96bd77be621506290df23caacb308cdd4749bfe2ebba5f8cf22e43ec5ab361c6433232932c3a720a1d72c2095557062123b3567f23d6bc3467ec893ce1863cc960cf63a5789990b712701abc77cf559d8ab35deea41616b2abf89a5512097", 0xca, 0x3f}], 0x1098c00, &(0x7f0000000640)={[{@dots}, {@fat=@errors_continue}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_appraise}, {@hash}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@uid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) symlinkat(&(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x0, 0xf2, 0x5, 0x9, 0x0, 0x6, 0x8080, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000740), 0x6}, 0x82, 0x8df5, 0x8, 0x1, 0x9, 0x8, 0x7, 0x0, 0xc614, 0x0, 0x7f}, 0x0, 0xa, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r3, 0x5) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x3) [ 722.117563] loop6: detected capacity change from 0 to 7 00:33:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 722.137825] loop3: detected capacity change from 0 to 7 [ 722.194425] loop1: detected capacity change from 0 to 7 [ 722.283807] loop2: detected capacity change from 0 to 40 [ 722.397719] syz-executor.2: attempt to access beyond end of device [ 722.397719] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 722.400277] Buffer I/O error on dev loop2, logical block 10, lost async page write [ 736.733513] loop2: detected capacity change from 0 to 40 00:34:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 1) 00:34:08 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000004100)=0x100000000) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000002580)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe, 0x10}], 0x2, 0x0) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$getregs(0xc, r2, 0xa56, &(0x7f00000016c0)=""/36) recvmmsg(0xffffffffffffffff, &(0x7f0000003f00)=[{{&(0x7f0000001280)=@nfc_llcp, 0x80, &(0x7f0000001440)=[{&(0x7f0000001300)=""/195, 0xc3}, {&(0x7f0000000100)=""/62, 0x3e}, {&(0x7f0000001400)=""/50, 0x32}], 0x3, &(0x7f0000001480)=""/155, 0x9b}, 0x3}, {{&(0x7f0000001540)=@rc={0x1f, @none}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000015c0)=""/25, 0x19}, {&(0x7f0000001600)=""/48, 0x30}, {&(0x7f0000001700)=""/230, 0xe6}, {&(0x7f0000001800)=""/220, 0xdc}, {&(0x7f0000001900)=""/156, 0x9c}, {&(0x7f0000001640)=""/92, 0x5c}], 0x6, &(0x7f0000001a40)=""/181, 0xb5}, 0x2d8}, {{&(0x7f0000001b00)=@x25={0x9, @remote}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001b80)=""/155, 0x9b}, {&(0x7f0000001c40)=""/114, 0x72}, {&(0x7f0000001cc0)=""/45, 0x2d}, {&(0x7f0000001d00)=""/145, 0x91}], 0x4, &(0x7f0000001e00)=""/247, 0xf7}, 0xfffff560}, {{&(0x7f0000001f00)=@hci, 0x80, &(0x7f0000002480)=[{&(0x7f0000001f80)=""/206, 0xce}, {&(0x7f0000002080)=""/244, 0xf4}, {&(0x7f0000002840)=""/4096, 0x1000}, {&(0x7f0000002180)=""/81, 0x51}, {&(0x7f0000002200)=""/188, 0xbc}, {&(0x7f0000004c80)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/120, 0x78}, {&(0x7f0000002340)=""/129, 0x81}, {&(0x7f0000002400)=""/121, 0x79}], 0x9, &(0x7f0000002540)=""/3, 0x3}, 0x9}, {{&(0x7f00000025c0)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f00000027c0)=[{&(0x7f00000026c0)=""/85, 0x55}, {&(0x7f0000002740)=""/122, 0x7a}], 0x2}}, {{0x0, 0x0, &(0x7f0000003980)=[{&(0x7f0000003880)=""/229, 0xe5}], 0x1, &(0x7f0000005c80)=""/4096, 0x1000}, 0x6}, {{&(0x7f00000039c0)=@sco={0x1f, @none}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000003a40)=""/149, 0x95}, {&(0x7f0000006c80)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/234, 0xea}, {&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/21, 0x15}, {&(0x7f0000003c40)=""/146, 0x92}], 0x6, &(0x7f0000003d80)=""/225, 0xe1}, 0x1}, {{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003e80)=""/18, 0x12}], 0x1, &(0x7f0000008c80)=""/4096, 0x1000}, 0x7a81}], 0x8, 0x141, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) fcntl$getown(r3, 0x9) ioctl$HIDIOCGFEATURE(0xffffffffffffffff, 0xc0404807, &(0x7f0000000000)={0x4, "6379d5b9bba93bc9b4223defdd75e8f54e964fbc2ee000f8847a3bfd88943dac9b498980219f57a5abc94dc64ac1f1e27c8211a7f95e033b11270c2bc86e40c3"}) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000002800)='devices.deny\x00', 0x2, 0x0) perf_event_open(&(0x7f0000004180)={0x5, 0x80, 0x5, 0x0, 0x5b, 0xb1, 0x0, 0x2, 0x80078, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000004140), 0x2}, 0x1828, 0x6, 0x6, 0x4, 0x8001, 0x7, 0x1ff, 0x0, 0x6, 0x0, 0x829}, 0x0, 0xe, 0xffffffffffffffff, 0x0) 00:34:08 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 1) 00:34:08 executing program 5: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:34:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:34:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 1) 00:34:08 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 1) 00:34:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0x0, 0x0, 0x8, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:34:08 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 2) 00:34:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 2) 00:34:08 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 2) 00:34:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 2) [ 736.886064] syz-executor.2: attempt to access beyond end of device [ 736.886064] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 736.887364] Buffer I/O error on dev loop2, logical block 10, lost async page write 00:34:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x0, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:34:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x0, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:34:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 1) 00:34:23 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 3) 00:34:23 executing program 5: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:34:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 3) 00:34:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x220) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) 00:34:23 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 3) 00:34:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 3) 00:34:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x0, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) [ 752.131246] loop2: detected capacity change from 0 to 40 [ 752.135392] FAULT_INJECTION: forcing a failure. [ 752.135392] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 752.136586] CPU: 1 PID: 6020 Comm: syz-executor.6 Not tainted 6.0.0-rc1-next-20220819 #1 [ 752.137217] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1521 [ 752.137875] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 6020, name: syz-executor.6 [ 752.138512] preempt_count: 0, expected: 0 [ 752.138817] RCU nest depth: 0, expected: 0 [ 752.139134] 1 lock held by syz-executor.6/6020: [ 752.139483] #0: ffff88801e09a868 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe7/0x100 [ 752.140082] FAULT_INJECTION: forcing a failure. [ 752.140082] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 752.140189] irq event stamp: 808 [ 752.140197] hardirqs last enabled at (807): [] __up_console_sem+0x78/0x80 [ 752.142595] hardirqs last disabled at (808): [] dump_stack_lvl+0x2e/0xb3 [ 752.143237] softirqs last enabled at (794): [] __irq_exit_rcu+0x11b/0x180 [ 752.143885] softirqs last disabled at (777): [] __irq_exit_rcu+0x11b/0x180 [ 752.144531] CPU: 1 PID: 6020 Comm: syz-executor.6 Not tainted 6.0.0-rc1-next-20220819 #1 [ 752.149238] syz-executor.6[6020] cmdline: /syz-executor.6 exec [ 752.150026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 752.151003] Call Trace: [ 752.151227] [ 752.151410] dump_stack_lvl+0x8b/0xb3 [ 752.151712] __might_resched.cold+0x222/0x26b [ 752.152205] down_read_killable+0x75/0x490 [ 752.152547] ? down_read_interruptible+0x490/0x490 [ 752.153063] __access_remote_vm+0xac/0x6f0 [ 752.153415] ? follow_phys+0x2c0/0x2c0 [ 752.153725] ? do_raw_spin_lock+0x121/0x260 [ 752.154177] ? rwlock_bug.part.0+0x90/0x90 [ 752.154526] ? lock_release+0x3b2/0x750 [ 752.154835] ? __up_console_sem+0x47/0x80 [ 752.155286] get_mm_cmdline.part.0+0x214/0x600 [ 752.155646] ? dname_to_vma_addr.isra.0+0x360/0x360 [ 752.156147] ? _raw_spin_unlock_irqrestore+0x33/0x60 [ 752.156570] get_task_cmdline_kernel+0x1e9/0x230 [ 752.157058] dump_stack_print_cmdline.part.0+0x82/0x150 [ 752.157469] ? _atomic_dec_and_lock_irqsave+0x150/0x150 [ 752.157951] ? __wake_up_klogd.part.0+0xc5/0xf0 [ 752.158386] ? dump_stack_print_info+0xc6/0x190 [ 752.158742] dump_stack_print_info+0x185/0x190 [ 752.159220] dump_stack_lvl+0x7f/0xb3 [ 752.159528] should_fail.cold+0x5/0xa [ 752.159834] _copy_to_user+0x2a/0x140 [ 752.160259] simple_read_from_buffer+0xcc/0x160 [ 752.160633] proc_fail_nth_read+0x198/0x230 [ 752.161081] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 752.161469] ? security_file_permission+0xb1/0xe0 [ 752.161850] vfs_read+0x253/0x930 [ 752.162255] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 752.162641] ? kernel_read+0x1c0/0x1c0 [ 752.163067] ? __fget_files+0x270/0x450 [ 752.163395] ksys_read+0x127/0x250 [ 752.163678] ? __ia32_sys_pwrite64+0x220/0x220 [ 752.164152] ? syscall_enter_from_user_mode+0x1d/0x50 [ 752.164587] ? syscall_enter_from_user_mode+0x1d/0x50 [ 752.165112] do_syscall_64+0x3b/0x90 [ 752.165410] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 752.165816] RIP: 0033:0x7fa5f5b4569c [ 752.166199] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 752.167650] RSP: 002b:00007fa5f3108170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 752.168360] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa5f5b4569c [ 752.169001] RDX: 000000000000000f RSI: 00007fa5f31081e0 RDI: 0000000000000006 [ 752.169582] RBP: 00007fa5f31081d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.170197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 752.170772] R13: 00007ffc0447dbdf R14: 00007fa5f3108300 R15: 0000000000022000 [ 752.171436] [ 752.217940] FAULT_INJECTION: forcing a failure. [ 752.217940] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 752.218819] CPU: 1 PID: 6019 Comm: syz-executor.3 Tainted: G W 6.0.0-rc1-next-20220819 #1 [ 752.219557] syz-executor.3[6019] cmdline: /syz-executor.3 exec [ 752.219999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 752.220838] Call Trace: [ 752.221042] [ 752.221217] dump_stack_lvl+0x8b/0xb3 [ 752.221525] should_fail.cold+0x5/0xa [ 752.221825] _copy_to_user+0x2a/0x140 [ 752.222128] simple_read_from_buffer+0xcc/0x160 [ 752.222487] proc_fail_nth_read+0x198/0x230 [ 752.222812] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 752.223201] ? security_file_permission+0xb1/0xe0 [ 752.223575] vfs_read+0x253/0x930 [ 752.223850] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 752.224236] ? kernel_read+0x1c0/0x1c0 [ 752.224542] ? __fget_files+0x270/0x450 [ 752.224855] ksys_read+0x127/0x250 [ 752.225139] ? __ia32_sys_pwrite64+0x220/0x220 [ 752.225494] ? syscall_enter_from_user_mode+0x1d/0x50 [ 752.225895] ? syscall_enter_from_user_mode+0x1d/0x50 [ 752.226304] do_syscall_64+0x3b/0x90 [ 752.226594] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 752.227001] RIP: 0033:0x7f420c76e69c [ 752.227286] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 752.228650] RSP: 002b:00007f4209d31170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 752.229221] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f420c76e69c [ 752.229754] RDX: 000000000000000f RSI: 00007f4209d311e0 RDI: 0000000000000006 [ 752.230295] RBP: 00007f4209d311d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.230823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 752.231360] R13: 00007ffe98ff0d8f R14: 00007f4209d31300 R15: 0000000000022000 [ 752.231910] 00:34:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 2) [ 752.385149] syz-executor.2: attempt to access beyond end of device [ 752.385149] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 752.386258] Buffer I/O error on dev loop2, logical block 10, lost async page write [ 752.397029] FAULT_INJECTION: forcing a failure. [ 752.397029] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.397979] CPU: 1 PID: 6017 Comm: syz-executor.1 Tainted: G W 6.0.0-rc1-next-20220819 #1 [ 752.402005] syz-executor.1[6017] cmdline: /syz-executor.1 exec [ 752.402475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 752.403440] Call Trace: [ 752.403661] [ 752.403846] dump_stack_lvl+0x8b/0xb3 [ 752.404279] should_fail.cold+0x5/0xa [ 752.404595] _copy_to_user+0x2a/0x140 [ 752.405019] simple_read_from_buffer+0xcc/0x160 [ 752.405405] proc_fail_nth_read+0x198/0x230 [ 752.405756] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 752.406254] ? security_file_permission+0xb1/0xe0 [ 752.406666] vfs_read+0x253/0x930 [ 752.407066] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 752.407460] ? kernel_read+0x1c0/0x1c0 [ 752.407778] ? __fget_files+0x270/0x450 [ 752.408240] ksys_read+0x127/0x250 [ 752.408531] ? __ia32_sys_pwrite64+0x220/0x220 [ 752.408993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 752.409425] ? syscall_enter_from_user_mode+0x1d/0x50 [ 752.409839] do_syscall_64+0x3b/0x90 [ 752.410253] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 752.410666] RIP: 0033:0x7fdbfef6669c [ 752.411046] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 752.412536] RSP: 002b:00007fdbfc529170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 752.413229] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdbfef6669c [ 752.413799] RDX: 000000000000000f RSI: 00007fdbfc5291e0 RDI: 0000000000000006 [ 752.414417] RBP: 00007fdbfc5291d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.415067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 752.415640] R13: 00007ffe227804df R14: 00007fdbfc529300 R15: 0000000000022000 [ 752.416317] 00:34:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x40000, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x655, 0x7fff, 0x0, 0x3, 0xde, 0xff, 0x200}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48c0}, 0x40) syz_io_uring_setup(0x4b7f, &(0x7f0000000300)={0x0, 0x1a44, 0x4, 0x4, 0x349}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000400)) [ 752.539051] FAULT_INJECTION: forcing a failure. [ 752.539051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.540070] CPU: 1 PID: 6034 Comm: syz-executor.7 Tainted: G W 6.0.0-rc1-next-20220819 #1 [ 752.545036] syz-executor.7[6034] cmdline: /syz-executor.7 exec [ 752.545533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 752.546526] Call Trace: [ 752.546723] [ 752.547024] dump_stack_lvl+0x8b/0xb3 [ 752.547346] should_fail.cold+0x5/0xa [ 752.547658] _copy_to_user+0x2a/0x140 [ 752.548062] simple_read_from_buffer+0xcc/0x160 [ 752.548460] proc_fail_nth_read+0x198/0x230 [ 752.548795] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 752.549271] ? security_file_permission+0xb1/0xe0 [ 752.549678] vfs_read+0x253/0x930 [ 752.550044] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 752.550455] ? kernel_read+0x1c0/0x1c0 [ 752.550767] ? __fget_files+0x270/0x450 [ 752.551208] ksys_read+0x127/0x250 [ 752.551495] ? __ia32_sys_pwrite64+0x220/0x220 [ 752.551896] ? syscall_enter_from_user_mode+0x1d/0x50 [ 752.552398] ? syscall_enter_from_user_mode+0x1d/0x50 [ 752.552804] do_syscall_64+0x3b/0x90 [ 752.553194] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 752.553637] RIP: 0033:0x7f6a0237e69c [ 752.553984] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 752.555450] RSP: 002b:00007f69ff941170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 752.556143] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6a0237e69c [ 752.556734] RDX: 000000000000000f RSI: 00007f69ff9411e0 RDI: 0000000000000006 [ 752.557335] RBP: 00007f69ff9411d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.557964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 752.558550] R13: 00007fffa920786f R14: 00007f69ff941300 R15: 0000000000022000 [ 752.559214] 00:34:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) (fail_nth: 3) [ 753.154357] syz-executor.6[6020] cmdline: [ 753.155027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 753.156671] Call Trace: [ 753.157079] [ 753.157414] dump_stack_lvl+0x8b/0xb3 [ 753.158009] should_fail.cold+0x5/0xa [ 753.158580] _copy_to_user+0x2a/0x140 [ 753.159179] simple_read_from_buffer+0xcc/0x160 [ 753.159829] proc_fail_nth_read+0x198/0x230 [ 753.160482] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 753.161221] ? security_file_permission+0xb1/0xe0 [ 753.161949] vfs_read+0x253/0x930 [ 753.162461] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 753.163181] ? kernel_read+0x1c0/0x1c0 [ 753.163753] ? __fget_files+0x270/0x450 [ 753.164395] ksys_read+0x127/0x250 [ 753.164984] ? __ia32_sys_pwrite64+0x220/0x220 [ 753.165661] ? syscall_enter_from_user_mode+0x1d/0x50 [ 753.166461] ? syscall_enter_from_user_mode+0x1d/0x50 [ 753.167248] do_syscall_64+0x3b/0x90 [ 753.167814] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 753.168629] RIP: 0033:0x7fa5f5b4569c [ 753.169199] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 753.171735] RSP: 002b:00007fa5f3108170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 753.172896] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa5f5b4569c [ 753.173970] RDX: 000000000000000f RSI: 00007fa5f31081e0 RDI: 0000000000000006 [ 753.175032] RBP: 00007fa5f31081d0 R08: 0000000000000000 R09: 0000000000000000 [ 753.176115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 753.177123] R13: 00007ffc0447dbdf R14: 00007fa5f3108300 R15: 0000000000022000 [ 753.178208] [ 753.178571] CPU: 0 PID: 6018 Comm: syz-executor.4 Tainted: G W 6.0.0-rc1-next-20220819 #1 [ 753.179923] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1521 [ 753.181079] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 6018, name: syz-executor.4 [ 753.182233] preempt_count: 0, expected: 0 [ 753.182791] RCU nest depth: 0, expected: 0 [ 753.183364] 1 lock held by syz-executor.4/6018: [ 753.183998] #0: ffff888014cfbc68 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe7/0x100 [ 753.185185] irq event stamp: 16398 [ 753.185665] hardirqs last enabled at (16397): [] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 753.187001] hardirqs last disabled at (16398): [] dump_stack_lvl+0x2e/0xb3 [ 753.188162] softirqs last enabled at (5958): [] __irq_exit_rcu+0x11b/0x180 [ 753.189423] softirqs last disabled at (5933): [] __irq_exit_rcu+0x11b/0x180 [ 753.190718] CPU: 0 PID: 6018 Comm: syz-executor.4 Tainted: G W 6.0.0-rc1-next-20220819 #1 00:34:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:34:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0xff, 0x84, 0x9, 0xf0, 0x0, 0x8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000800), 0x8}, 0x448, 0x9, 0x5, 0xb, 0x0, 0x4, 0x5, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 00:34:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:34:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) [ 753.194299] syz-executor.4[6018] cmdline: [ 753.195076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 753.196760] Call Trace: [ 753.197180] [ 753.197521] dump_stack_lvl+0x8b/0xb3 [ 753.198116] __might_resched.cold+0x222/0x26b [ 753.198789] down_read_killable+0x75/0x490 [ 753.199425] ? down_read_interruptible+0x490/0x490 [ 753.200179] __access_remote_vm+0xac/0x6f0 [ 753.200810] ? follow_phys+0x2c0/0x2c0 [ 753.201428] ? do_raw_spin_lock+0x121/0x260 [ 753.202087] ? rwlock_bug.part.0+0x90/0x90 [ 753.202725] ? lock_release+0x3b2/0x750 [ 753.203355] ? __up_console_sem+0x47/0x80 [ 753.203996] get_mm_cmdline.part.0+0x214/0x600 [ 753.204705] ? dname_to_vma_addr.isra.0+0x360/0x360 [ 753.205458] ? llist_reverse_order+0x60/0x60 [ 753.206171] get_task_cmdline_kernel+0x1e9/0x230 [ 753.206839] ? tick_nohz_tick_stopped+0x16/0x90 [ 753.207560] dump_stack_print_cmdline.part.0+0x82/0x150 [ 753.208349] ? _atomic_dec_and_lock_irqsave+0x150/0x150 [ 753.209129] ? __wake_up_klogd.part.0+0xc5/0xf0 [ 753.209880] ? dump_stack_print_info+0xc6/0x190 [ 753.210565] dump_stack_print_info+0x185/0x190 [ 753.211258] dump_stack_lvl+0x7f/0xb3 [ 753.211810] should_fail.cold+0x5/0xa [ 753.212408] _copy_to_user+0x2a/0x140 [ 753.212984] simple_read_from_buffer+0xcc/0x160 [ 753.213661] proc_fail_nth_read+0x198/0x230 [ 753.214347] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 753.215314] ? security_file_permission+0xb1/0xe0 [ 753.216055] vfs_read+0x253/0x930 [ 753.216201] loop2: detected capacity change from 0 to 40 [ 753.216566] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 753.216599] ? kernel_read+0x1c0/0x1c0 [ 753.218639] ? __fget_files+0x270/0x450 [ 753.219284] ksys_read+0x127/0x250 [ 753.219832] ? __ia32_sys_pwrite64+0x220/0x220 [ 753.220536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 753.221319] ? syscall_enter_from_user_mode+0x1d/0x50 [ 753.222145] do_syscall_64+0x3b/0x90 [ 753.222702] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 753.223489] RIP: 0033:0x7f2edbd2969c [ 753.224067] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 753.226778] RSP: 002b:00007f2ed92ec170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 753.227917] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2edbd2969c [ 753.228956] RDX: 000000000000000f RSI: 00007f2ed92ec1e0 RDI: 0000000000000006 [ 753.229981] RBP: 00007f2ed92ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 753.231017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 753.232032] R13: 00007fffcd69755f R14: 00007f2ed92ec300 R15: 0000000000022000 [ 753.233077] [ 753.233560] syz-executor.4[6018] cmdline: [ 753.234212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 753.236028] Call Trace: [ 753.236421] [ 753.236749] dump_stack_lvl+0x8b/0xb3 [ 753.237336] should_fail.cold+0x5/0xa [ 753.237917] _copy_to_user+0x2a/0x140 [ 753.238475] simple_read_from_buffer+0xcc/0x160 [ 753.239215] proc_fail_nth_read+0x198/0x230 [ 753.239891] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 753.240607] ? security_file_permission+0xb1/0xe0 [ 753.241362] vfs_read+0x253/0x930 [ 753.241909] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 753.242627] ? kernel_read+0x1c0/0x1c0 [ 753.243223] ? __fget_files+0x270/0x450 [ 753.243827] ksys_read+0x127/0x250 [ 753.244424] ? __ia32_sys_pwrite64+0x220/0x220 [ 753.245161] ? syscall_enter_from_user_mode+0x1d/0x50 [ 753.245943] ? syscall_enter_from_user_mode+0x1d/0x50 [ 753.246729] do_syscall_64+0x3b/0x90 [ 753.247304] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 753.248060] RIP: 0033:0x7f2edbd2969c [ 753.248599] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 753.251458] RSP: 002b:00007f2ed92ec170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 753.252554] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2edbd2969c [ 753.253556] RDX: 000000000000000f RSI: 00007f2ed92ec1e0 RDI: 0000000000000006 [ 753.254722] RBP: 00007f2ed92ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 753.255722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 753.256742] R13: 00007fffcd69755f R14: 00007f2ed92ec300 R15: 0000000000022000 [ 753.257773] 00:34:25 executing program 4: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r0, 0x5) 00:34:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000480)='./file1\x00', 0x0) mount_setattr(r0, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x30, 0x5, 0x7f, 0x3, 0x0, 0xffffffffffff31b5, 0x20002, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, @perf_config_ext={0x100000001, 0x400}, 0x4417, 0x2, 0x101, 0x0, 0x8, 0x4, 0x8, 0x0, 0x7fffffff, 0x0, 0x9}, 0x0, 0x9, r0, 0x1) syz_mount_image$ext4(&(0x7f00000019c0)='ext2\x00', &(0x7f0000001a00)='./file1\x00', 0x4, 0x5, &(0x7f0000002cc0)=[{&(0x7f0000001a40)="d24bdda2c37a27abedb11ee4da42729fb03fb20ff8014f8ddc6ad24efd4137ccd148dbe33c3df7df4398", 0x2a, 0x8001}, {&(0x7f0000001a80)="7b2af9137994b99f2b47c7c8a224bb2313a6139dcadddbb7575e76b1b4269439c44e", 0x22, 0x7}, {&(0x7f0000001ac0)="cb665ae06b49abd50fa5f5387e814d180e36c94f70954658ef6028a36271f83151f50807fbecd3c389cce61f2e08f6222b41ea1759e59959d17695494661e878e007d9182a785b18834b0bafd5de7e2691741e9931d5a92a1cad7e696f086a4cf3282aebec13ccbb12d2f7bf3e732dbed2ccb211a7f1dbf2d75db9c3d2104b1545fef7d3311ac083b1a8265f88f27f9da84aa95d834d42c36090b3b77b98571241e9ef0c8ec374de201639de4242d63b37554cd72ce68a4ded4b21fb1cc904dc85a19bc00c", 0xc5, 0x8001}, {&(0x7f0000001bc0)="b0d76732da1e1d7463a5b53d310b25ae4214c7ee23bc41437e66319a3a659d6c68d74ad4c5e525d0d90fc611760a2bc413a9db18c6ca4fb8376e527cbe8cf55c725b28a192c98c872ad6d294ad736edf35127624084dccbc85684949493eb6209c2157ed423f739a3f4b6d7cf53f01b1af60d2f28af6aa966b0c63311302941e7b9b5501b1d65697267f7d35902b8968edd7fa7e7ab13562751f68cddbe07adcfec226a4c3d26089602496e4063923c4a45dd96722f868a264f290b3ce863639ac82c2f0e8467d5df9b763a50919ae9bddb0dd48547231f9174bc73c8c4514c75aa1d7e917f4c48b12e05f256d8fb4890465b1d3d680acde8c320492619ae123be93bfc05e2f8c15f8c2328d82ba5b4050d42c251cabefe0b7c3df13db61345768985e03a00580fa2e2e0dd1bfae61485ef3e95afe973103729c89eebd64bc4aa9edec4db7760902c82f70a10a9af7c7ab709d5f6d6411676a6714c973f10be3fb7ca9ecd8d05bef38af615dc3def7554ce4e9208f67fb96ade55f0b46d31bb8090dd783a6b08ae45aba2fe46287fdb6e44601afe11c20016d3625736e0facd681fc0dc3ceea477cba658091713d52720d50b82eabbebe344de9f17c03354119e7d09ec47e7cde02fb366825fc15e81eb28c899b0912bed9757d026e55def82cc26f25fce18548db2334f846a5fc4d7f144dca01d50307904725b356e4ab02e148d63264e47e7288d1648fbd5634aa2c390391b69490494c99aa6b59ed0aacdbdef81fd5829ff932a3185492cb57f98b6aaa814e0f2ec9f4d94e4546af02f13884964835322b7ebb5060e7aae9da2ec0262e8f870ec413af33d066fdf93601a79e12a3777e8bd8740d20a446d5999f4ef7c36acca91913d9556a499cc3604a5f2c96b8ae05b537d4a574f7d61572972e62e4259d4ef669c153ad37ee7158e46f110ce894796ea34bd83fcbd2e7ddeee2e8f72116109aa7cce404aec9cf275eef94653dfa6e1e59fe80bb66e7bc05e6f17ab9c228bb29124a0e5f687c27913464b9078d3a725faae559f3b29399df47e504bced9fae16e7befb8c02d4271fd84c423af18dd3368d68b5dd09b98f0770a63f223d545c4d20d77a61175e448c6d57aefbf37afd12ed4304fc5074739ca68a8cbc407348b498117d6b54e0d7df1e542d41939843d3badcd53874b2d5638bf59d356a1fb6de090aee54f24945cafdec53e6eeeeb69ad90b72665ee9b75576517ccb37bf236d6b9037ec3380a70af107e656c60bd22a144108633b094a25a9a95315f0b74637b8a9712f62b43ad1bc401c4e32dd1457f932f1c34e418868208fe0ae6b56f98ad60eb2ed093ec4f2c0ea5f92e4f9e66b89df7c456272a7c67caad47d85cd626ab406e3dfc6acbad7bdeffe523d69d9450e6d043d43cb04244718aabab76f579360171c7e6621a246b5c9e2117fbb8af693a2237b1d73117a92e59cfa699d4c926adb51a75a0deed1215777dde6bcd03b4f1c0de38614732daa1fe43897fd8cbceb63c1076aa6536bc969f9b1b922f9908fbc4576b2fadc245f32a2f842699c4a640101898f585ed845d4ccd09a4f9d2966db6e7d12487df0f637f0e59c827fffe772b5ddc04cf46431544a9ba1b95f1ca00fa98c7efed7a1955bb168a4d53a9c1fee904daaea0c3c5d2e409c4b22e2c5f2080959da4b8e6892e36facd540a127072c0358c048778a10bfa28426e9e1d2ffe42e5633dfd76341b7adc95f8d13f945df4ac5e125d3f226a9408c2c8b82993f5a7bdbb5dc1f52061fd424ef8b604307611a3b2bb423e9945924934f30defade3956e7514dfe91299ec00328905631c277a7d244ec9b7069274bdaf5d8bba591eb96b88f1612d5c29c113a06a1e6e3855e7b7560aea6a891642772730a5c36a14456739a04859b51cd25e6516739e14f8a48484ad91ab470a16d9486169f2ab21ade0b421f60ce7e84f60a24f69dbe00e13c86dc57d5ea47a533e35f9a946d43eb6e065133e89aeebd118b0fe96ef82d1d7afe6c56def6f5c39d4501e7a9f478f42604ff804e9831fb63abbb0201eccfe05dfca21f168c55e6c95d9b8cda7b3379936242779eeedc8c8ad94349574d6337d062d7dbe9c86b280e73d432b7283b4d4285cf2c4a7d9b79bf314473c23a42b089dd90f0aedc93236d060204e35976f925697db41d447975078fea49bbb509902660261540be7b8831a5fd0efbdf113ebd0944ebb3171b3da5d0a7574270ac75ca5d6549eed0c5c1ee4ea4dfe7f551899cbe4164d3edc03c1fdee1ca9dbd4ebec2bd953d4a3b6433dea5a2dc5ecc83720666bb5c53ad9a0d9cd731d2a9090504c1391931f18226f661dcc6f532ecda0ec5c39b5084800a2cddcbe1ec5680d104f2d9aca59fb103e76fcaad087afdb473932cf8487a3e2997bbdfae9d320ef57a7eb65d5d58936cfdcbfdfa582c68c73e5e70451f0f0dc445cb66e01b8cc2ede95653ae36dbcf4326282b93a366f75d0cc34f60ae7c7f241d91b3490fcfd616cc9aec70dc68a8abdc160b542638b5434c0a63291f5840bf02cf4347a42cea867952e5b2f53f2d031bf92e79cc1bba9938e7593ffd79817628529132110841bf5b049e2f18dedac15ccad15b29f081ca27508039849cf4f099e6deda0423ef576cc5c873644d6847e4cf6e0fc0c57bf6a5a5140a93ce74d925370635f80e20432b444a5357ccbdd4e5e791b0ec783af59cbd504f2c06b41e3730677eadd9b74b5584267141f815e4319e51d53d23f8c527788cdd3140f07e29cec032e6e9c988fdbbde0613fdebe0962c42f64dc8e529d486c1d6bd2cd7176207f0f497172c4a04c53bc71a0a57b2f7292b007588cfad5cefa88796d0ca8d54b13715019b9415d80b2fa53fa57142c163929bf30348cb3dd19a6dbe749aa30f87d10d55130896a148ac823fabae2689606bcf221f60631adb945d50e31bba8ef53d77d0197ef16a9abe3429c6e5aa849c27c4ea3a438e01e1d4cb7a957954808d0f451d6433325305e070e76030175da0e8e3bd5e99e97cd5427d90a9c7dd4e74b9b7ca75ce0c1c05cc294a5149fc0bcb351531d81f5f00358936076ee7fb79b58ee8f25c25afbffa229a3efccc760d86d44766a32a41e714c58a442fb851030f801b72fa72b687e50dca286ca5245dce719c90b26d3b8e63773a5ac097f87c6e5d159f57ceeaea0d9ff2c73f52cd793fcee62684f13b0fc7618b4b9b148390c20a1857f659d49f359b4d2647d4b1fc1e5f3f90ff4f07a9050378207dce09fea11130ce01f9c349f42ef7c551e0976e0d822a39bedb47f4118ecc924c6ff3f2ef41865be40d49ba6d89ca39202742e2ba88e0dec7778ab4b9fb6db0a8eb023b38e53693c1501028ee51b0342241566a8be1357ed2a7803cb62effc9282033e7a1e78d0fa8e4133b618737bcbeace2d77ded86d3840e07f37645c9a3ccc8724e9dfd461d72977b649f64a114e13043c64b11b8d874274d004033a63732ec655cec61d86b56fa9606b0882ad8ad769d21721e40e1eef1175c9cefa1989c46cb5b640369abb0f69880d9b6ce0617947ce00d1e498eda4c6aa83b5dcbf97b5e8afde1be7cbfded047bf3539a28361804522e198473b4fbb814c2c13cc8e16c6fe80bd5045295a884dc3870b17750b5d643541975ff8b42acd490bcaeb249c69439f5e021a416608df0c30d8a8d6eaff671c1ef0b70e2b91693862f5209b03ad7bf31ad08a7b72dd4f95e45f3a1222ebac65cdd3d839dc8c8ee1c35b0f24cec551dd3c993749876849c9e9396eab774fa994527109ac6f0bfeeecfbed81bd8783ad714f5be9f517678a1b1ab6f9088764d0e7561e8806100995c386bde378e35b0d1d5902f1c0ca77a52e1b01b0768494a0645cf1e36043f766c482d19d39f8ac511db2ae9b5b0fa0e1d28c53af2e299529691793442ca10f7cd090fbd3dee130d326ef511a6b38a0c64cad69bc7c5f16b11d128241fea1fb85b84c07ed23bb28355a2fd0a42ae0543665af63b38343b23ccf15ae0f8969616b03ac165d70d04dad3925637b7c69f15dbe8fd912a776ae2826e44289f33a117a76dbb2444eb6e8f29273647ad68ff309fd4b01b6870b5aa9a525a6089cb798654995d80b8e02cea4d77fea1da329fd6820fbb21600566345e6067d2f524ce5d5a57b5ccba1b6a4199d5d8cdeebab9c66c7899f7f8421a5bf560f4d38617dc2b329c1e5b177c8ab285f3acf5a9d1712987ade99f0178e5a03cb30b0f02c48ce33181e17943279b30ecedd2dfc61b177ad7f380ead77f826142ff61fe6dc4b7ed8462f26807bb54e7ef94d797a6da46749732aa249e6d32d9594427ce86cd018a4c98710eceb42b4e5772aa937a19812568e4af992b49d9d3f674e2dff934c562df56fb8fd87f009788d05a0591ef2f16f06609c87d6c8ae4e7f1dce4110431475139b4f70d880268c341ea04076f7a614de1103e85c4309071c16f729768ea4c5db3a03e322e6e3567eb9883ba12183c0d5fb1d38b1645612be5d7f6550500e8e24dfadfbdca480593607aa939fd04db8d33008cb6ba83875f898de6f87f23f128619935fba6be0e75c5ea70456366720f92d7317e0328f07f58cce5d1365f52ece3bd0d6ec7cac2ddd5eb54966b0d55cc6bef8cf192d02f825df77f4ed21a064996cb9bc250ba597637bd014fe43c599f2fd283f07e08625d517d58f9a774a2ac0210e1b3d41e04aee97343da2d48536bfdb3787718fe31932791e198b98fed6e95fd8239b60eebaf215d988ff442e28aa491ee7171d1962802059dd0a2e6fd1fff2446b7907abc53dc0383989b10961128d47cbdfff4133aec6609ee2627d6e60e5fe37a374886326fccb1209dab50a753eed9736d523a26c2cc911a5028c977cfc589e090f018f4821c8fbdf41bdcd1dfde255628accb73d78919dcda15ac49495744772449adae96d13a4ff8b0c3c6d87d01a5b0515860cf25743cbfe9ba0c6d129011abee76687ef9a718700de261a7041e13d4fb282245a8e07965c967ac8237a9a85bd46a055b2ae6390798877fe38ec4dddcabafba6b0b43182c0f6ff6be8be9ff7b308d56094627296bd0fc5096a2125a98755ab7b9f9750766107ad44d76f7a01248ea1f660658fdb03467e1ee80d502bb1751ea101fcb5c47e2c6457c0d98aac558c02bff99ac7816167d2fca24c3b4e969d3007aab895199265d2e8237a330e84d4c86e480e023704c90ba95a78b2c530b3efa154ec6e6e6ff8ba7a3e2c6597304db0b81c75e804a67182f809743f56a75d80ad1662d93ee3b6d1585d7ecae5990700d5edc9188573b628d5a88dd08a8b4bb6e1d0868a339450d766717af3013e5b844f953e08654fcf71abd409ea7560d1a5b3f744fad1958ef2f5c87c2e85cda8e899deee1de7d40579aac0eed642be333f3934123655df9c1e91818896b9bea2175a5db50a77e9f1f02cdef0aed276cb0e623ef185e89bdbddf0ea310d9245b532fa20e8fe014bcdde5c3d9678a7142cb4817e5542b18b77dfdad8a4225bd158e89a8116faf99a081f61700fe17b227b612a8589353ecb9c38040acd897d2ed18bd74bd85b699ed925ae2fbaebb2f1ae17318c6199ab35ebb26b718e0413b3eba6058aeddba28c98a2f389154372a092ddd101e97006747861854c74ed36f27c8b50d55ffc9a4854d95ea0194eca26cca5d7367cbb7b02d2170ed3d0215512ee72a3bcf29064f8aec6165408a1d824e0b7b108b6d31af1e73c6df47212e986f019c78cf3144c8f529cf0e81ddeb95284d66", 0x1000, 0x3ff}, {&(0x7f0000002bc0)="f18612aed891cac5ce911c1620bf9a6619bd39bcf44bf09a19170f9038ac8c145e00b5dc9ed42edfca08886c6b1f65e42cb7e4d44d7e98d78387f4a97c68601d6d82c35edb482672fd1e5cc49f37618c72671fd16dcff994ec2a9bbf0996408101ff7947407dc058cf81fe24e80a59225206700d2ca5d1b6e9c5ecc714c1dfd1d99bc104193a477970c4c9cf1a40aaa68c1a9c598c29cb7f240a259cef0f073dd13b1990eb352c77bc96ae16e577503d177b383d4328426096a698f002b3cfcd8d317d39eef3afde548b3b0440e8b718786a56219029fd7802b50f05da318f442c99fd225d598c426e0bb798c84df45d223c", 0xf2, 0x2792}], 0x2, &(0x7f0000002d40)={[{@i_version}, {@dioread_lock}, {@usrquota}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}], [{@obj_type={'obj_type', 0x3d, '-%$}'}}]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) flock(r1, 0x5) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) preadv(r2, &(0x7f0000001900)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000300)=""/214, 0xd6}, {&(0x7f00000001c0)=""/143, 0x8f}, {&(0x7f00000004c0)=""/129, 0x81}, {&(0x7f0000000580)=""/178, 0xb2}, {&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000400)=""/121, 0x79}, {&(0x7f0000000700)=""/244, 0xf4}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/203, 0xcb}], 0xa, 0x6, 0xffff) [ 753.455111] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 753.456539] Buffer I/O error on dev loop2, logical block 0, async page read [ 753.457829] loop2: unable to read partition table [ 753.461798] loop2: partition table beyond EOD, truncated [ 753.490168] loop1: detected capacity change from 0 to 128 [ 753.510842] EXT4-fs: Mount option "i_version" will be removed by 5.20 [ 753.510842] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 753.510842] [ 753.513339] EXT4-fs: Use iversion instead [ 753.513339] [ 753.526084] EXT4-fs: quotafile must be on filesystem root VM DIAGNOSIS: 00:34:24 Registers: info registers vcpu 0 RAX=0000000000010004 RBX=ffff88800ab68000 RCX=0000000000000000 RDX=000000000001c062 RSI=ffffffff820bd017 RDI=0000000000000007 RBP=000000000001c062 RSP=ffff88806ce09da8 R8 =0000000000000007 R9 =0000000000010000 R10=000000000001c062 R11=0000000000000001 R12=000000000001c062 R13=ffff88800ab68180 R14=ffff88800ab6c068 R15=ffff88800ab68008 RIP=ffffffff820bd01b RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2ed92ec700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2dd21000 CR3=000000000fe42000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffff00 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff8240ad4c RDI=ffffffff8762a6c0 RBP=ffffffff8762a680 RSP=ffff88801a6f7028 R8 =0000000000000004 R9 =0000000000000010 R10=0000000000000003 R11=0000000000000001 R12=0000000000002710 R13=0000000000000060 R14=fffffbfff0ec5527 R15=dffffc0000000000 RIP=ffffffff8240ada1 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa5f3108700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007eff1917ef48 CR3=000000000d3c0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000