)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 508.970925][ T2012] blk_update_request: I/O error, dev loop7, sector 512 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 508.982781][ T2012] Buffer I/O error on dev loop7, logical block 64, lost async page write [ 509.070537][T26784] loop7: detected capacity change from 0 to 1036 [ 509.288903][T26792] loop7: detected capacity change from 0 to 1036 23:52:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:01 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:01 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:01 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 23:52:01 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 509.713234][T26809] loop7: detected capacity change from 0 to 1036 23:52:01 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:01 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f0", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:01 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:01 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 23:52:01 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f0", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:02 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:02 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 23:52:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:02 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f0", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:02 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 510.552806][T26845] loop7: detected capacity change from 0 to 1036 23:52:02 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:02 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:02 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:02 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:02 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:02 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 511.172164][T26872] loop7: detected capacity change from 0 to 1036 [ 511.323108][T26872] blk_update_request: I/O error, dev loop7, sector 200 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 511.334752][T26872] Buffer I/O error on dev loop7, logical block 25, lost async page write [ 511.343367][T26872] blk_update_request: I/O error, dev loop7, sector 208 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 511.354793][T26872] Buffer I/O error on dev loop7, logical block 26, lost async page write [ 511.363360][T26872] blk_update_request: I/O error, dev loop7, sector 216 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 511.374700][T26872] Buffer I/O error on dev loop7, logical block 27, lost async page write [ 511.383169][T26872] blk_update_request: I/O error, dev loop7, sector 224 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 511.394503][T26872] Buffer I/O error on dev loop7, logical block 28, lost async page write [ 511.402968][T26872] blk_update_request: I/O error, dev loop7, sector 232 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 511.414296][T26872] Buffer I/O error on dev loop7, logical block 29, lost async page write [ 511.422787][T26872] blk_update_request: I/O error, dev loop7, sector 240 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 511.434379][T26872] Buffer I/O error on dev loop7, logical block 30, lost async page write [ 511.442876][T26872] blk_update_request: I/O error, dev loop7, sector 248 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 511.454221][T26872] Buffer I/O error on dev loop7, logical block 31, lost async page write 23:52:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:03 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:03 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, 0xffffffffffffffff, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 511.559110][ T36] kauditd_printk_skb: 6 callbacks suppressed [ 511.559131][ T36] audit: type=1800 audit(1617839523.121:1052): pid=26882 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14387 res=0 errno=0 23:52:03 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 511.666763][ T36] audit: type=1800 audit(1617839523.231:1053): pid=26887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14161 res=0 errno=0 23:52:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:03 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 511.733826][ T36] audit: type=1800 audit(1617839523.231:1054): pid=26888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14403 res=0 errno=0 [ 511.781777][T26895] loop7: detected capacity change from 0 to 1036 [ 511.926388][ T36] audit: type=1800 audit(1617839523.491:1055): pid=26898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14483 res=0 errno=0 [ 511.997327][T26901] loop7: detected capacity change from 0 to 1036 23:52:03 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, 0xffffffffffffffff, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 512.235174][ T36] audit: type=1800 audit(1617839523.801:1056): pid=26910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14465 res=0 errno=0 23:52:03 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:03 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, 0xffffffffffffffff, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 512.424252][T26918] loop7: detected capacity change from 0 to 1036 23:52:04 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, 0xffffffffffffffff, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:04 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 512.705007][ T2012] blk_update_request: I/O error, dev loop7, sector 640 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 512.716438][ T2012] Buffer I/O error on dev loop7, logical block 80, lost async page write 23:52:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:04 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 512.785373][T26933] loop7: detected capacity change from 0 to 1036 [ 512.831375][ T36] audit: type=1800 audit(1617839524.391:1057): pid=26939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14226 res=0 errno=0 23:52:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:04 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 513.053192][ T36] audit: type=1800 audit(1617839524.441:1058): pid=26943 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14403 res=0 errno=0 23:52:04 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 513.154726][ T36] audit: type=1800 audit(1617839524.461:1059): pid=26946 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14530 res=0 errno=0 [ 513.238526][T26963] loop7: detected capacity change from 0 to 1036 23:52:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 513.375954][ T36] audit: type=1800 audit(1617839524.601:1060): pid=26951 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14369 res=0 errno=0 [ 513.404684][ T36] audit: type=1800 audit(1617839524.611:1061): pid=26952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14387 res=0 errno=0 23:52:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 513.476202][ T2012] blk_update_request: I/O error, dev loop7, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 513.489132][ T2012] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 513.502072][ T2012] blk_update_request: I/O error, dev loop7, sector 8 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 513.514376][ T2012] Buffer I/O error on dev loop7, logical block 1, lost async page write 23:52:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:05 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 513.755018][T26980] loop7: detected capacity change from 0 to 1036 23:52:05 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 514.024139][T26998] loop7: detected capacity change from 0 to 1036 23:52:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:05 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 514.370196][T27016] loop7: detected capacity change from 0 to 1036 23:52:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:06 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 514.909373][T27034] loop7: detected capacity change from 0 to 1036 23:52:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:06 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) 23:52:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 515.226729][T27061] loop7: detected capacity change from 0 to 1036 23:52:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) [ 515.519468][T27073] loop7: detected capacity change from 0 to 1036 23:52:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:07 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:07 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:07 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 515.811704][T27086] loop7: detected capacity change from 0 to 1036 23:52:07 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:07 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:07 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 516.156196][T27096] loop7: detected capacity change from 0 to 1036 23:52:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) 23:52:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:07 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:08 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:08 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:08 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 516.548141][T27124] loop7: detected capacity change from 0 to 1036 23:52:08 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:08 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:08 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 516.778951][T27132] loop7: detected capacity change from 0 to 1036 23:52:08 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) 23:52:08 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:08 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:08 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 517.280270][T27152] loop7: detected capacity change from 0 to 1036 [ 517.283015][ T36] kauditd_printk_skb: 21 callbacks suppressed [ 517.283051][ T36] audit: type=1800 audit(1617839528.851:1083): pid=27157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14562 res=0 errno=0 23:52:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:09 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) [ 517.539597][ T36] audit: type=1800 audit(1617839529.101:1084): pid=27167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14817 res=0 errno=0 23:52:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:09 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 517.620834][ T36] audit: type=1800 audit(1617839529.181:1085): pid=27171 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=13922 res=0 errno=0 [ 517.705285][T27176] loop7: detected capacity change from 0 to 1036 [ 517.749385][ T36] audit: type=1800 audit(1617839529.221:1086): pid=27174 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14722 res=0 errno=0 23:52:09 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 517.981329][T27186] loop7: detected capacity change from 0 to 1036 23:52:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:09 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 518.298152][T27199] loop7: detected capacity change from 0 to 1036 23:52:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:10 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:10 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) [ 518.529510][T27208] loop7: detected capacity change from 0 to 1036 23:52:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 518.591872][ T36] audit: type=1800 audit(1617839530.151:1087): pid=27214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14817 res=0 errno=0 23:52:10 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 518.658478][ T36] audit: type=1800 audit(1617839530.221:1088): pid=27218 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14754 res=0 errno=0 23:52:10 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 518.736591][ T36] audit: type=1800 audit(1617839530.291:1089): pid=27221 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14865 res=0 errno=0 23:52:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 518.902558][T27232] loop7: detected capacity change from 0 to 1036 [ 518.903005][ T36] audit: type=1800 audit(1617839530.471:1090): pid=27234 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14929 res=0 errno=0 23:52:10 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:10 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:10 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 519.165423][ T36] audit: type=1800 audit(1617839530.731:1091): pid=27245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14451 res=0 errno=0 [ 519.213816][T27246] loop7: detected capacity change from 0 to 1036 23:52:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 519.464270][ T36] audit: type=1800 audit(1617839531.031:1092): pid=27255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15009 res=0 errno=0 23:52:11 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 519.648429][T27268] loop7: detected capacity change from 0 to 1036 23:52:11 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 519.947783][T27287] loop7: detected capacity change from 0 to 1036 23:52:11 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:11 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:11 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 520.452900][T27308] loop7: detected capacity change from 0 to 1036 23:52:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:12 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:12 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:12 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:12 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:12 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:12 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 520.815372][T27326] loop7: detected capacity change from 0 to 1036 23:52:12 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 521.035213][ T2130] print_req_error: 10 callbacks suppressed [ 521.035230][ T2130] blk_update_request: I/O error, dev loop7, sector 1024 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 521.054166][ T2130] buffer_io_error: 8 callbacks suppressed [ 521.054179][ T2130] Buffer I/O error on dev loop7, logical block 128, lost async page write 23:52:12 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 521.248232][T27345] loop7: detected capacity change from 0 to 1036 [ 521.520527][T27355] loop7: detected capacity change from 0 to 1036 23:52:13 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:13 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:13 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:13 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:13 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 521.861217][T27372] loop7: detected capacity change from 0 to 1036 23:52:13 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:13 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:13 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 522.156718][T27389] loop7: detected capacity change from 0 to 1036 [ 522.191171][T27394] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 23:52:14 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:14 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:14 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, 0xffffffffffffffff, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:14 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 522.943661][T27407] loop7: detected capacity change from 0 to 1036 23:52:14 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, 0xffffffffffffffff, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 523.069629][ T36] kauditd_printk_skb: 10 callbacks suppressed [ 523.069643][ T36] audit: type=1800 audit(1617839534.631:1103): pid=27413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15666 res=0 errno=0 23:52:14 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:14 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, 0xffffffffffffffff, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:14 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:14 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 523.295168][T27407] blk_update_request: I/O error, dev loop7, sector 520 op 0x0:(READ) flags 0x80700 phys_seg 31 prio class 0 23:52:14 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 523.388746][ T36] audit: type=1800 audit(1617839534.951:1104): pid=27430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15682 res=0 errno=0 23:52:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 523.433599][ T36] audit: type=1800 audit(1617839534.981:1105): pid=27428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14738 res=0 errno=0 23:52:15 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:15 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 523.548984][ T36] audit: type=1800 audit(1617839534.991:1106): pid=27431 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14802 res=0 errno=0 [ 523.614677][T27441] loop7: detected capacity change from 0 to 1036 [ 523.680685][ T36] audit: type=1800 audit(1617839535.141:1107): pid=27438 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15490 res=0 errno=0 [ 523.705810][ T36] audit: type=1800 audit(1617839535.241:1108): pid=27446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15666 res=0 errno=0 [ 523.893927][ T2130] blk_update_request: I/O error, dev loop7, sector 384 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 523.905361][ T2130] Buffer I/O error on dev loop7, logical block 48, lost async page write 23:52:15 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:15 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 523.928672][ T36] audit: type=1800 audit(1617839535.491:1109): pid=27452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15762 res=0 errno=0 [ 524.116265][T27457] loop7: detected capacity change from 0 to 1036 23:52:15 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:15 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:16 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:16 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:16 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:16 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 524.555818][ T36] audit: type=1800 audit(1617839536.121:1110): pid=27474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15841 res=0 errno=0 [ 524.671365][T27479] loop7: detected capacity change from 0 to 1036 23:52:16 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:16 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 524.917054][ T36] audit: type=1800 audit(1617839536.481:1111): pid=27491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15825 res=0 errno=0 23:52:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:16 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:16 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 525.101194][ T36] audit: type=1800 audit(1617839536.661:1112): pid=27501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15729 res=0 errno=0 [ 525.128254][T27498] loop7: detected capacity change from 0 to 1036 23:52:16 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:16 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 525.571470][T27516] loop7: detected capacity change from 0 to 1036 23:52:17 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:17 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:17 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:17 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 525.784284][T27520] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 17 prio class 0 23:52:17 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:17 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:17 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:17 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 526.012200][T27536] loop7: detected capacity change from 0 to 1036 23:52:17 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:17 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:17 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 526.270729][T27552] loop7: detected capacity change from 0 to 1036 [ 526.315437][T27557] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 526.515634][ T2130] blk_update_request: I/O error, dev loop7, sector 256 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 526.527011][ T2130] Buffer I/O error on dev loop7, logical block 32, lost async page write 23:52:18 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:18 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:18 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:18 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:18 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 526.978117][T27576] loop7: detected capacity change from 0 to 1036 23:52:18 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:18 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:18 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:18 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:18 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 527.305585][T27598] loop7: detected capacity change from 0 to 1036 23:52:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 527.502172][ T2130] blk_update_request: I/O error, dev loop7, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 23:52:19 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 527.746747][T27620] loop7: detected capacity change from 0 to 1036 [ 527.942458][ T2130] blk_update_request: I/O error, dev loop7, sector 768 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 527.954103][ T2130] Buffer I/O error on dev loop7, logical block 96, lost async page write [ 527.962698][ T2130] blk_update_request: I/O error, dev loop7, sector 776 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 527.974191][ T2130] Buffer I/O error on dev loop7, logical block 97, lost async page write [ 527.982760][ T2130] blk_update_request: I/O error, dev loop7, sector 784 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 527.994242][ T2130] Buffer I/O error on dev loop7, logical block 98, lost async page write [ 528.003852][ T2130] blk_update_request: I/O error, dev loop7, sector 792 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 528.015487][ T2130] Buffer I/O error on dev loop7, logical block 99, lost async page write [ 528.024446][ T2130] blk_update_request: I/O error, dev loop7, sector 800 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 528.036293][ T2130] Buffer I/O error on dev loop7, logical block 100, lost async page write [ 528.044977][ T2130] blk_update_request: I/O error, dev loop7, sector 808 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 528.056521][ T2130] Buffer I/O error on dev loop7, logical block 101, lost async page write [ 528.065303][ T2130] blk_update_request: I/O error, dev loop7, sector 816 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 528.076867][ T2130] Buffer I/O error on dev loop7, logical block 102, lost async page write [ 528.085632][ T2130] Buffer I/O error on dev loop7, logical block 103, lost async page write [ 528.103429][ T2130] Buffer I/O error on dev loop7, logical block 104, lost async page write 23:52:19 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:19 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:19 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 528.265413][T27633] loop7: detected capacity change from 0 to 1036 23:52:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:20 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:20 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) [ 528.442910][ T36] kauditd_printk_skb: 9 callbacks suppressed [ 528.442923][ T36] audit: type=1800 audit(1617839540.011:1122): pid=27639 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16113 res=0 errno=0 23:52:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 528.538430][ T36] audit: type=1800 audit(1617839540.041:1123): pid=27641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15889 res=0 errno=0 [ 528.607881][T27651] loop7: detected capacity change from 0 to 1036 23:52:20 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 528.717865][ T36] audit: type=1800 audit(1617839540.281:1124): pid=27653 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16115 res=0 errno=0 23:52:20 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) [ 528.844139][ T36] audit: type=1800 audit(1617839540.411:1125): pid=27656 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15713 res=0 errno=0 23:52:20 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) [ 529.189687][T27669] loop7: detected capacity change from 0 to 1036 23:52:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:21 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:21 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:21 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:21 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 529.674828][ T36] audit: type=1800 audit(1617839541.241:1126): pid=27681 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15889 res=0 errno=0 [ 529.789000][ T36] audit: type=1800 audit(1617839541.351:1127): pid=27686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16115 res=0 errno=0 23:52:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:21 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 530.017022][ T36] audit: type=1800 audit(1617839541.401:1128): pid=27689 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16120 res=0 errno=0 [ 530.105040][T27699] loop7: detected capacity change from 0 to 1036 [ 530.132547][ T36] audit: type=1800 audit(1617839541.701:1129): pid=27698 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16118 res=0 errno=0 23:52:21 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:21 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:22 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 530.493322][T27714] loop7: detected capacity change from 0 to 1036 23:52:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:22 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:22 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 530.709277][T27722] loop7: detected capacity change from 0 to 1036 [ 530.779063][ T36] audit: type=1800 audit(1617839542.341:1130): pid=27725 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15570 res=0 errno=0 23:52:22 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:22 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:22 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 530.988676][ T36] audit: type=1800 audit(1617839542.551:1131): pid=27734 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15713 res=0 errno=0 [ 531.131134][T27744] loop7: detected capacity change from 0 to 1036 23:52:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 531.383670][T27744] print_req_error: 3 callbacks suppressed [ 531.383696][T27744] blk_update_request: I/O error, dev loop7, sector 1024 op 0x0:(READ) flags 0x80700 phys_seg 2 prio class 0 23:52:23 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:23 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:23 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 531.643364][T27764] loop7: detected capacity change from 0 to 1036 23:52:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:23 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:23 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:23 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:23 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 532.275289][T27785] loop7: detected capacity change from 0 to 1036 23:52:24 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:24 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:24 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 532.625108][T27798] loop7: detected capacity change from 0 to 1036 23:52:24 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:24 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:24 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 533.049074][T27809] loop7: detected capacity change from 0 to 1036 [ 533.082602][T27813] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 23:52:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 533.095575][ T2130] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 533.106554][ T2130] buffer_io_error: 1 callbacks suppressed [ 533.106568][ T2130] Buffer I/O error on dev loop7, logical block 0, async page read 23:52:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:25 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:25 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 533.622229][T27830] loop7: detected capacity change from 0 to 1036 23:52:25 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 533.931040][T27838] loop7: detected capacity change from 0 to 1036 [ 534.068808][ T36] kauditd_printk_skb: 7 callbacks suppressed [ 534.068935][ T36] audit: type=1800 audit(1617839545.631:1139): pid=27847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16118 res=0 errno=0 23:52:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:25 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:25 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 534.275697][ T36] audit: type=1800 audit(1617839545.681:1140): pid=27836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16126 res=0 errno=0 [ 534.429963][T27859] loop7: detected capacity change from 0 to 1036 [ 534.448910][ T36] audit: type=1800 audit(1617839545.801:1141): pid=27850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16120 res=0 errno=0 23:52:26 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 534.643476][ T2130] blk_update_request: I/O error, dev loop7, sector 768 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 534.654861][ T2130] Buffer I/O error on dev loop7, logical block 96, lost async page write [ 534.743285][ T36] audit: type=1800 audit(1617839545.901:1142): pid=27857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16130 res=0 errno=0 [ 534.812330][T27868] loop7: detected capacity change from 0 to 1036 [ 534.919091][ T36] audit: type=1800 audit(1617839545.961:1143): pid=27858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16134 res=0 errno=0 23:52:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:26 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 535.053205][ T2130] blk_update_request: I/O error, dev loop7, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 535.064454][ T2130] Buffer I/O error on dev loop7, logical block 0, lost async page write 23:52:26 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:26 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 535.196055][ T36] audit: type=1800 audit(1617839546.761:1144): pid=27878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13902 res=0 errno=0 [ 535.378194][ T36] audit: type=1800 audit(1617839546.941:1145): pid=27884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16114 res=0 errno=0 [ 535.409513][T27883] loop7: detected capacity change from 0 to 1036 [ 535.414999][T27888] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 535.427467][ T2130] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 535.438510][ T2130] Buffer I/O error on dev loop7, logical block 0, async page read 23:52:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:27 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 535.702281][ T36] audit: type=1800 audit(1617839547.271:1146): pid=27896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=13910 res=0 errno=0 23:52:27 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:27 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:27 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 536.048758][T27903] loop7: detected capacity change from 0 to 1036 23:52:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:27 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:27 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) 23:52:27 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 536.235511][ T36] audit: type=1800 audit(1617839547.801:1147): pid=27912 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13915 res=0 errno=0 [ 536.317005][T27918] loop7: detected capacity change from 0 to 1036 [ 536.357936][ T36] audit: type=1800 audit(1617839547.921:1148): pid=27922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15874 res=0 errno=0 23:52:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:28 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:28 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:28 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 536.837054][T27939] loop7: detected capacity change from 0 to 1036 23:52:28 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 537.093330][T27942] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 23:52:28 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:28 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:28 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:28 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:28 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 537.322366][T27958] loop7: detected capacity change from 0 to 1036 23:52:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:29 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 537.561543][T27969] loop7: detected capacity change from 0 to 1036 23:52:29 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:29 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 537.873918][T27982] loop7: detected capacity change from 0 to 1036 23:52:29 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 538.076831][ T2012] blk_update_request: I/O error, dev loop7, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 538.088656][ T2012] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 538.104335][ T2012] blk_update_request: I/O error, dev loop7, sector 8 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 538.122043][ T2012] Buffer I/O error on dev loop7, logical block 1, lost async page write [ 538.136817][ T2012] blk_update_request: I/O error, dev loop7, sector 16 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 538.151764][ T2012] Buffer I/O error on dev loop7, logical block 2, lost async page write [ 538.167245][ T2012] blk_update_request: I/O error, dev loop7, sector 24 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 538.186965][ T2012] Buffer I/O error on dev loop7, logical block 3, lost async page write [ 538.202193][ T2012] blk_update_request: I/O error, dev loop7, sector 32 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 538.213937][ T2012] Buffer I/O error on dev loop7, logical block 4, lost async page write 23:52:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 538.224371][ T2012] blk_update_request: I/O error, dev loop7, sector 40 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 538.237437][ T2012] Buffer I/O error on dev loop7, logical block 5, lost async page write [ 538.247906][ T2012] blk_update_request: I/O error, dev loop7, sector 48 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 538.260768][ T2012] Buffer I/O error on dev loop7, logical block 6, lost async page write [ 538.298360][ T2130] blk_update_request: I/O error, dev loop7, sector 56 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 538.309694][ T2130] Buffer I/O error on dev loop7, logical block 7, lost async page write 23:52:29 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:30 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:30 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 538.499994][T28011] loop7: detected capacity change from 0 to 1036 23:52:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:30 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:30 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 538.860419][T28024] loop7: detected capacity change from 0 to 1036 23:52:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:30 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:30 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 539.143570][ T36] kauditd_printk_skb: 10 callbacks suppressed [ 539.143583][ T36] audit: type=1800 audit(1617839550.711:1159): pid=28036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13956 res=0 errno=0 [ 539.219956][ T36] audit: type=1800 audit(1617839550.781:1160): pid=28042 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=13949 res=0 errno=0 [ 539.326270][T28043] loop7: detected capacity change from 0 to 1036 23:52:31 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:31 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 539.475593][ T36] audit: type=1800 audit(1617839551.041:1161): pid=28054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13927 res=0 errno=0 23:52:31 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:31 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 539.734547][T28061] loop7: detected capacity change from 0 to 1036 23:52:31 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:31 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 539.977691][ T36] audit: type=1800 audit(1617839551.541:1162): pid=28073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13956 res=0 errno=0 23:52:31 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 540.150050][ T36] audit: type=1800 audit(1617839551.581:1163): pid=28071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=13958 res=0 errno=0 23:52:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 540.210000][T28078] loop7: detected capacity change from 0 to 1036 [ 540.266152][ T36] audit: type=1800 audit(1617839551.831:1164): pid=28082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13943 res=0 errno=0 [ 540.308979][ T36] audit: type=1800 audit(1617839551.871:1165): pid=28086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=13949 res=0 errno=0 23:52:32 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:32 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 540.575675][T28091] loop7: detected capacity change from 0 to 1036 [ 540.650800][ T36] audit: type=1800 audit(1617839552.211:1166): pid=28097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=13941 res=0 errno=0 [ 540.809908][ T36] audit: type=1800 audit(1617839552.371:1167): pid=28101 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13949 res=0 errno=0 23:52:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:32 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:32 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 540.931042][ T36] audit: type=1800 audit(1617839552.491:1168): pid=28104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13956 res=0 errno=0 23:52:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 541.046800][T28110] loop7: detected capacity change from 0 to 1036 23:52:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:32 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 541.423903][T28126] loop7: detected capacity change from 0 to 1036 23:52:33 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:33 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:33 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 541.840768][T28140] loop7: detected capacity change from 0 to 1036 23:52:33 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:33 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 542.073310][ T2130] blk_update_request: I/O error, dev loop7, sector 768 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 542.085788][ T2130] Buffer I/O error on dev loop7, logical block 96, lost async page write 23:52:33 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 542.291015][T28154] loop7: detected capacity change from 0 to 1036 [ 542.334615][T28160] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 23:52:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 542.534442][ T2012] blk_update_request: I/O error, dev loop7, sector 88 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 542.547955][ T2012] Buffer I/O error on dev loop7, logical block 11, async page read 23:52:34 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:34 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 542.727890][T28180] loop7: detected capacity change from 0 to 1036 23:52:34 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:34 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 23:52:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:34 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 23:52:34 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 543.360902][T28199] loop7: detected capacity change from 0 to 1036 23:52:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:35 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 23:52:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:35 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:35 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:35 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:35 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 544.302067][ T36] kauditd_printk_skb: 19 callbacks suppressed [ 544.302080][ T36] audit: type=1800 audit(1617839555.871:1188): pid=28240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13960 res=0 errno=0 23:52:35 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:36 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 544.571787][ T36] audit: type=1800 audit(1617839556.131:1189): pid=28251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13962 res=0 errno=0 23:52:36 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:36 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) 23:52:36 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 544.836538][ T36] audit: type=1800 audit(1617839556.401:1190): pid=28260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13950 res=0 errno=0 [ 544.904827][ T36] audit: type=1800 audit(1617839556.471:1191): pid=28262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=13927 res=0 errno=0 [ 544.968296][T28267] loop7: detected capacity change from 0 to 1036 [ 545.052602][ T36] audit: type=1800 audit(1617839556.531:1192): pid=28266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=13974 res=0 errno=0 23:52:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 545.206482][ T36] audit: type=1800 audit(1617839556.761:1193): pid=28274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13960 res=0 errno=0 [ 545.290914][ T36] audit: type=1800 audit(1617839556.821:1194): pid=28277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=13975 res=0 errno=0 23:52:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 545.581857][ T36] audit: type=1800 audit(1617839557.141:1195): pid=28284 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13952 res=0 errno=0 23:52:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:37 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) [ 545.813785][ T36] audit: type=1800 audit(1617839557.381:1196): pid=28291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=13950 res=0 errno=0 [ 545.895932][ T36] audit: type=1800 audit(1617839557.381:1197): pid=28292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13958 res=0 errno=0 23:52:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:37 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:38 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 549.538845][ T36] kauditd_printk_skb: 23 callbacks suppressed [ 549.538859][ T36] audit: type=1800 audit(1617839561.101:1221): pid=28380 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=13973 res=0 errno=0 23:52:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 549.935620][ T36] audit: type=1800 audit(1617839561.501:1222): pid=28392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=13952 res=0 errno=0 23:52:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 550.005774][ T36] audit: type=1800 audit(1617839561.521:1223): pid=28390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=13959 res=0 errno=0 23:52:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 550.112808][ T36] audit: type=1800 audit(1617839561.531:1224): pid=28393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13960 res=0 errno=0 [ 550.202738][ T36] audit: type=1800 audit(1617839561.541:1225): pid=28396 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13963 res=0 errno=0 23:52:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 550.279089][ T36] audit: type=1800 audit(1617839561.721:1226): pid=28404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13941 res=0 errno=0 23:52:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 550.381188][ T36] audit: type=1800 audit(1617839561.731:1227): pid=28406 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=13962 res=0 errno=0 [ 550.424457][ T36] audit: type=1800 audit(1617839561.851:1228): pid=28410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13963 res=0 errno=0 23:52:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 550.484982][ T36] audit: type=1800 audit(1617839561.911:1229): pid=28414 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13958 res=0 errno=0 23:52:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 550.525317][ T36] audit: type=1800 audit(1617839562.041:1230): pid=28418 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13980 res=0 errno=0 23:52:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:43 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:43 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(0x0, 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 551.982703][T28466] loop7: detected capacity change from 0 to 1036 23:52:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(0x0, 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:43 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:43 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(0x0, 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 552.424618][T28492] loop7: detected capacity change from 0 to 1036 23:52:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(0x0, 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:44 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 553.009427][T28518] loop7: detected capacity change from 0 to 1036 23:52:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:44 executing program 2: getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:45 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:45 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:45 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 554.101147][T28550] loop7: detected capacity change from 0 to 1036 23:52:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:45 executing program 2: getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 554.373715][T28557] blk_update_request: I/O error, dev loop7, sector 40 op 0x0:(READ) flags 0x80700 phys_seg 2 prio class 0 23:52:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:46 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 554.675186][T28583] loop7: detected capacity change from 0 to 1036 [ 554.765184][ T36] kauditd_printk_skb: 41 callbacks suppressed [ 554.765216][ T36] audit: type=1800 audit(1617839566.331:1272): pid=28590 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13989 res=0 errno=0 23:52:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:46 executing program 3: getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 555.105406][ T36] audit: type=1800 audit(1617839566.671:1273): pid=28594 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13989 res=0 errno=0 [ 555.194080][ T36] audit: type=1800 audit(1617839566.701:1274): pid=28596 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14013 res=0 errno=0 23:52:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 555.323594][ T36] audit: type=1800 audit(1617839566.751:1275): pid=28599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13989 res=0 errno=0 23:52:46 executing program 5: getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:46 executing program 2: getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 555.387944][ T36] audit: type=1800 audit(1617839566.911:1276): pid=28602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=13980 res=0 errno=0 23:52:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 555.453717][ T36] audit: type=1800 audit(1617839567.021:1277): pid=28610 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14030 res=0 errno=0 23:52:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:47 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 555.533537][ T36] audit: type=1800 audit(1617839567.031:1278): pid=28613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14037 res=0 errno=0 23:52:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 555.603786][ T36] audit: type=1800 audit(1617839567.031:1279): pid=28614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14038 res=0 errno=0 23:52:47 executing program 3: getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 555.647401][ T36] audit: type=1800 audit(1617839567.041:1280): pid=28609 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14039 res=0 errno=0 [ 555.670173][ T36] audit: type=1800 audit(1617839567.041:1281): pid=28611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14040 res=0 errno=0 23:52:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 555.952018][T28627] ================================================================== [ 555.960155][T28627] BUG: KCSAN: data-race in wbt_wait / wbt_wait [ 555.966295][T28627] [ 555.968624][T28627] write to 0xffff8881038f5040 of 8 bytes by task 28614 on cpu 1: [ 555.976339][T28627] wbt_wait+0x12b/0x2b0 [ 555.980502][T28627] __rq_qos_throttle+0x39/0x70 [ 555.985388][T28627] blk_mq_submit_bio+0x253/0x1060 [ 555.990447][T28627] submit_bio_noacct+0x7c2/0x9a0 [ 555.995398][T28627] submit_bio+0x200/0x370 [ 555.999733][T28627] iomap_dio_bio_actor+0x92d/0xb60 [ 556.004863][T28627] iomap_dio_actor+0x26e/0x3b0 [ 556.009744][T28627] iomap_apply+0x1e1/0x4a0 [ 556.014197][T28627] __iomap_dio_rw+0x4c4/0xa30 [ 556.018885][T28627] iomap_dio_rw+0x30/0x70 [ 556.023349][T28627] ext4_file_read_iter+0x3bb/0x420 [ 556.028470][T28627] generic_file_splice_read+0x22a/0x310 [ 556.034023][T28627] splice_direct_to_actor+0x2aa/0x650 [ 556.039416][T28627] do_splice_direct+0xf5/0x170 [ 556.044196][T28627] do_sendfile+0x7a6/0xe20 [ 556.048622][T28627] __x64_sys_sendfile64+0xf2/0x130 [ 556.053777][T28627] do_syscall_64+0x39/0x80 [ 556.058196][T28627] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 556.064101][T28627] [ 556.066450][T28627] read to 0xffff8881038f5040 of 8 bytes by task 28627 on cpu 0: [ 556.074081][T28627] wbt_wait+0xcf/0x2b0 [ 556.078193][T28627] __rq_qos_throttle+0x39/0x70 [ 556.082967][T28627] blk_mq_submit_bio+0x253/0x1060 [ 556.088001][T28627] submit_bio_noacct+0x7c2/0x9a0 [ 556.093060][T28627] submit_bio+0x200/0x370 [ 556.097399][T28627] iomap_dio_bio_actor+0x92d/0xb60 [ 556.102528][T28627] iomap_dio_actor+0x26e/0x3b0 [ 556.107404][T28627] iomap_apply+0x1e1/0x4a0 [ 556.112034][T28627] __iomap_dio_rw+0x4c4/0xa30 [ 556.116750][T28627] iomap_dio_rw+0x30/0x70 [ 556.121097][T28627] ext4_file_read_iter+0x3bb/0x420 [ 556.126305][T28627] generic_file_splice_read+0x22a/0x310 [ 556.131866][T28627] splice_direct_to_actor+0x2aa/0x650 [ 556.137382][T28627] do_splice_direct+0xf5/0x170 [ 556.142162][T28627] do_sendfile+0x7a6/0xe20 [ 556.146589][T28627] __x64_sys_sendfile64+0xf2/0x130 [ 556.151721][T28627] do_syscall_64+0x39/0x80 [ 556.156162][T28627] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 556.162069][T28627] [ 556.164476][T28627] Reported by Kernel Concurrency Sanitizer on: [ 556.170628][T28627] CPU: 0 PID: 28627 Comm: syz-executor.2 Not tainted 5.12.0-rc6-syzkaller #0 [ 556.179917][T28627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.190101][T28627] ================================================================== [ 556.322271][ T3233] ieee802154 phy0 wpan0: encryption failed: -22 [ 556.328595][ T3233] ieee802154 phy1 wpan1: encryption failed: -22 23:52:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:48 executing program 1: getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:48 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:48 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:48 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 556.761527][T28660] loop7: detected capacity change from 0 to 1036 23:52:48 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:48 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 556.947673][T28666] loop7: detected capacity change from 0 to 1036 23:52:48 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 557.286843][T28676] loop7: detected capacity change from 0 to 1036 23:52:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:49 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:49 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:50 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:50 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000300)={0x6, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:51 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:51 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(0x0, 0x0) 23:52:51 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 559.922883][T28750] loop7: detected capacity change from 0 to 1036 [ 560.029699][ T36] kauditd_printk_skb: 29 callbacks suppressed [ 560.029726][ T36] audit: type=1800 audit(1617839571.590:1311): pid=28757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14053 res=0 errno=0 23:52:51 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 560.059831][ T36] audit: type=1800 audit(1617839571.600:1312): pid=28759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14054 res=0 errno=0 23:52:51 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 560.243218][T28763] loop7: detected capacity change from 0 to 1036 23:52:51 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:52 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:52 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 560.702439][T28776] loop7: detected capacity change from 0 to 1036 [ 560.721007][ T36] audit: type=1800 audit(1617839572.280:1313): pid=28785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14058 res=0 errno=0 [ 560.747688][ T36] audit: type=1800 audit(1617839572.310:1314): pid=28781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14015 res=0 errno=0 [ 560.887132][ T36] audit: type=1800 audit(1617839572.450:1315): pid=28783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14059 res=0 errno=0 23:52:52 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, 0xffffffffffffffff, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:52 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 561.179123][T28796] loop7: detected capacity change from 0 to 1036 [ 561.206412][ T36] audit: type=1800 audit(1617839572.770:1316): pid=28802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=14042 res=0 errno=0 23:52:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:52 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 561.361286][T28808] loop7: detected capacity change from 0 to 1036 23:52:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:53 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:53 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 561.627468][ T36] audit: type=1800 audit(1617839573.190:1317): pid=28819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14020 res=0 errno=0 [ 561.687187][T28820] loop7: detected capacity change from 0 to 1036 [ 561.738877][ T36] audit: type=1800 audit(1617839573.300:1318): pid=28827 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14058 res=0 errno=0 23:52:53 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 561.884579][ T36] audit: type=1800 audit(1617839573.310:1319): pid=28829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14059 res=0 errno=0 [ 561.913394][T28820] blk_update_request: I/O error, dev loop7, sector 1024 op 0x0:(READ) flags 0x80700 phys_seg 2 prio class 0 23:52:53 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 561.991115][ T36] audit: type=1800 audit(1617839573.340:1320): pid=28830 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14060 res=0 errno=0 23:52:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:53 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 562.189666][T28845] loop7: detected capacity change from 0 to 1036 23:52:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getrlimit(0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x71) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 562.755632][T28873] loop7: detected capacity change from 0 to 1036 23:52:54 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 562.949409][T28881] loop7: detected capacity change from 0 to 1036 23:52:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:54 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 563.476116][T28910] loop7: detected capacity change from 0 to 1036 23:52:55 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 563.687877][ T2012] blk_update_request: I/O error, dev loop7, sector 512 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 563.699572][ T2012] Buffer I/O error on dev loop7, logical block 64, lost async page write 23:52:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:55 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f0", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) 23:52:55 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 564.084695][T28929] loop7: detected capacity change from 0 to 1036 23:52:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x0, 0x249}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(0x0, 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(0x0, 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:56 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x0, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6", 0x46}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b0000000000000000794c60decae7aa82d0144e3c55a284d55eea62938ef343c8790500df699127529d98ba7028143900bcb3eb9f11e244855970a044372014ae052d95fbca65483aea3597a5f09fcd104d29e8b102f1af", @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e2100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x7fffffff, 0x2]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 564.529602][T28951] loop7: detected capacity change from 0 to 1036 23:52:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x6, 0x249}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(0x0, 0x84002, 0x0) sendfile(r1, r2, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000080)='./bus\x00', 0x0) 23:52:56 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x149ed, 0x0, 0x0, 0x3, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x20, 0x1, 0x0, 0x1, 0xd0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x2, 0x7}, 0xc506, 0x4, 0x0, 0x6, 0x1, 0x4, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000340)='\t\x8d0;\xe4\x02;uR\xfe\x16\xfc\x10\x04\x01\x1c\x9f3{\xf9\xe8\x89kL\x8c\x849\xdf\xb7\\\x00\x00\x008\x01\xcc\x8a,\f\xc5\x82\xb2Wi\xfc\x03uf\xf6\xb6\xfc\x84\xfb\xab\xb6\x17E,\x9b\x18\x87\x989.HcP\x13\xc4\x12\xe9\xbb\xac\'+6\xc5\xed[p_\x0e>\x17\xc2\xd98w8/\xcf\xd1\x95\x1a[\xebUa\xf0\xb8\xa0%\x8cO\xcf\x86\xcfO\xd1\xde\xb0Qu\fK\xcd\xb7\x98\'\x91\x13\xb3\xff\x1c\x9a\xa0\xfa}e\xd8\n\xcb\xa8\x85X\xab\xff\x12i\x8cy\xf0~d\xbb\xc7WRP\xe3E\x11K\xad\x1e\x02\x85F\x1c\xaf3\xc6\x14\xc4\xf0w-', 0x1) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x7, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b54", 0x4a}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wg2\x00'}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYBLOB="e40500008ec2c4cc60c0c950c7c7adc99d5b312bc3dc3d15c97db509c1a49575d7f0e52aa73c3ca5bcb47ba2536684aaf057429a9a923a92ced27bd4dfe36d9c00c48d067bf6646e8c6ff2483f5f0b00000000", @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf250000000008000500000000000800050001000000060006004e21000008000100", @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x4000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x9bfb4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x8, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92e6725240b5b87cff1866be0bec480ebc5c2189e00", [0x0, 0x2d]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xfffffffffffffeac) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b5