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"}]}]}, 0x9e0}], 0x2}, 0x0) 19:12:56 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:12:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x57, &(0x7f0000000140)={&(0x7f0000000000)={0x30, r3, 0x401, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x8}]}, 0x30}}, 0x0) sendfile(r2, r1, 0x0, 0x0) 19:12:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x90, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2e}, @NFTA_SET_EXPR={0x54, 0x11, 0x0, 0x1, @match={{0xa}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_MATCH_INFO={0x2c, 0x3, "b9a6dd66615effce17da8306daaaf2f055f5d30acb5b035f53124eca72e2810f95c87f5df41f8b38"}, @NFTA_MATCH_NAME={0xa, 0x1, 'limit\x00'}, @NFTA_MATCH_REV={0x8}]}}}]}], {0x14, 0x10}}, 0xd8}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x5f5, 0x0, 0x0, 0x0, 0x0) 19:12:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:12:56 executing program 2: setresuid(0xffffffffffffffff, 0xee01, 0x0) r0 = geteuid() setreuid(r0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) faccessat(r1, &(0x7f0000000040)='./file0\x00', 0x0) 19:12:56 executing program 5: syz_mount_image$msdos(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="2cf943dd6074732c646f74732c6e6f646f74732c646f74732c66736e616d653d7b2d3a2c61707072616973655f747970653d696d617369672c736d61636b66737472616e736d7574653d"]) [ 276.753984][T14560] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 19:12:56 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 276.841903][T14563] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 19:12:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x82030000, &(0x7f00000003c0)) 19:12:56 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$get_persistent(0xc, 0xffffffffffffffff, r1) 19:12:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x90, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2e}, @NFTA_SET_EXPR={0x54, 0x11, 0x0, 0x1, @match={{0xa}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_MATCH_INFO={0x2c, 0x3, "b9a6dd66615effce17da8306daaaf2f055f5d30acb5b035f53124eca72e2810f95c87f5df41f8b38"}, @NFTA_MATCH_NAME={0xa, 0x1, 'limit\x00'}, @NFTA_MATCH_REV={0x8}]}}}]}], {0x14, 0x10}}, 0xd8}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x5f5, 0x0, 0x0, 0x0, 0x0) 19:12:56 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe8, 0x13, 0x1, 0x0, 0x0, {{'morus640-sse2\x00'}}, [{0xc}]}, 0xe8}}, 0x0) 19:12:56 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:12:56 executing program 2: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x3, 0xffffffffffffffff, 0x0) [ 277.128440][T14582] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 277.162457][T14584] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 19:12:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 19:12:57 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:12:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:12:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5412, &(0x7f0000000000)={0x47}) 19:12:57 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae1f7094e77e0346e8347eb1163b8b425ba21c21fbe379a5ebf1c099e4514e8d860d9b81a53f44abc32024bc917c00e27f0995458ceffb9ee81aa6eefa66f1ec079e8fb78f124d1ccd53823922f77d703c35f6e6e808be26db462f90774c", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 19:12:57 executing program 3: syslog(0x3, &(0x7f0000000000)=""/71, 0x47) 19:12:57 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 19:12:57 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:12:57 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x5460, 0x0) 19:12:57 executing program 2: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x1000000000000) [ 277.944117][T14612] ptrace attach of "/root/syz-executor.2"[14609] was attempted by "/root/syz-executor.2"[14612] 19:12:57 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:12:57 executing program 0: r0 = socket(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 19:12:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 19:12:57 executing program 5: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) 19:12:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:12:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$get_persistent(0x18, 0xffffffffffffffff, r1) 19:12:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @broadcast}, @l2tp={0x2, 0x0, @multicast2}, @llc, 0x1f}) 19:12:58 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:12:58 executing program 2: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x300, 0x0) 19:12:58 executing program 5: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) 19:12:58 executing program 2: keyctl$get_persistent(0x4, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000940)={0x54, 0x14, 0x1, 0x0, 0x0, "", [@nested={0x20, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}]}, @typed={0xd, 0x0, 0x0, 0x0, @str='@-#-}&@!\x00'}, @generic="2ebe82671a512be9652d1edeed01156de0"]}, 0x54}], 0x1}, 0x0) 19:12:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x44c, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:12:58 executing program 0: syz_emit_ethernet(0xbe, &(0x7f0000000180)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x4c, 0x0, @wg=@initiation={0x1, 0x0, "e7ab1921f32c00000000000000b82583870a9cfbac20b7d7925f1022fffa1c50", "1f50b39b7f746f414760638a5bf7aee400d16a777ee7959de4453cbeadb58f0d7c1c4d5c5eb8e653d884bf8e12ab411e", "139306e54e6e9930735c93194b66bbb547204ea2edb043dbd33f16ce", {"60ae7f081de1a2ea7325d2b6b701e3f3", "6f08ba5b8351d46b54a009188e03093d"}}}}}}}, 0x0) 19:12:58 executing program 5: keyctl$get_persistent(0xf, 0x0, 0x0) 19:12:58 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 279.004829][T14655] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 279.056599][T14661] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 19:12:58 executing program 0: syz_emit_ethernet(0xbe, &(0x7f0000000180)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x4c, 0x0, @wg=@initiation={0x1, 0x0, "e7ab1921f32c00000000000000b82583870a9cfbac20b7d7925f1022fffa1c50", "1f50b39b7f746f414760638a5bf7aee400d16a777ee7959de4453cbeadb58f0d7c1c4d5c5eb8e653d884bf8e12ab411e", "139306e54e6e9930735c93194b66bbb547204ea2edb043dbd33f16ce", {"60ae7f081de1a2ea7325d2b6b701e3f3", "6f08ba5b8351d46b54a009188e03093d"}}}}}}}, 0x0) 19:12:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:12:59 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:12:59 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, 0x0, &(0x7f00000001c0)) 19:12:59 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:12:59 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:12:59 executing program 0: syz_emit_ethernet(0xbe, &(0x7f0000000180)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x4c, 0x0, @wg=@initiation={0x1, 0x0, "e7ab1921f32c00000000000000b82583870a9cfbac20b7d7925f1022fffa1c50", "1f50b39b7f746f414760638a5bf7aee400d16a777ee7959de4453cbeadb58f0d7c1c4d5c5eb8e653d884bf8e12ab411e", "139306e54e6e9930735c93194b66bbb547204ea2edb043dbd33f16ce", {"60ae7f081de1a2ea7325d2b6b701e3f3", "6f08ba5b8351d46b54a009188e03093d"}}}}}}}, 0x0) 19:12:59 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 279.811585][T14682] loop5: detected capacity change from 0 to 264192 [ 279.813442][T14681] loop3: detected capacity change from 0 to 8 19:12:59 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x2, 0x0) 19:12:59 executing program 0: syz_emit_ethernet(0xbe, &(0x7f0000000180)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x4c, 0x0, @wg=@initiation={0x1, 0x0, "e7ab1921f32c00000000000000b82583870a9cfbac20b7d7925f1022fffa1c50", "1f50b39b7f746f414760638a5bf7aee400d16a777ee7959de4453cbeadb58f0d7c1c4d5c5eb8e653d884bf8e12ab411e", "139306e54e6e9930735c93194b66bbb547204ea2edb043dbd33f16ce", {"60ae7f081de1a2ea7325d2b6b701e3f3", "6f08ba5b8351d46b54a009188e03093d"}}}}}}}, 0x0) [ 279.978263][T14681] unable to read xattr id index table 19:12:59 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:12:59 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 280.071121][T14681] loop3: detected capacity change from 0 to 8 19:12:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000180)=0x3ff, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000540), r0) [ 280.139847][T14681] unable to read xattr id index table [ 280.267570][T14710] loop5: detected capacity change from 0 to 264192 19:13:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:00 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 19:13:00 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:00 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:00 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe0, 0x13, 0x1, 0x0, 0x0, {{'morus640-sse2\x00'}}}, 0xe0}}, 0x0) recvmmsg(r0, &(0x7f00000061c0)=[{{&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001680)=[{0x0}, {&(0x7f00000000c0)=""/52, 0x34}, {&(0x7f0000000280)=""/32, 0x20}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x22, 0x0) 19:13:00 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:00 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) [ 280.820343][T14725] loop5: detected capacity change from 0 to 264192 [ 280.836589][T14730] loop3: detected capacity change from 0 to 8 19:13:00 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:00 executing program 2: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 280.944081][T14730] unable to read xattr id index table 19:13:00 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:00 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 19:13:00 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 281.131530][T14748] loop3: detected capacity change from 0 to 8 [ 281.172356][T14748] unable to read xattr id index table [ 281.271148][T14755] loop5: detected capacity change from 0 to 264192 19:13:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x0) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f00000032c0), 0xc) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="68000000b62797"], 0x68}}, 0x0) 19:13:01 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:01 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x1267, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:13:01 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:01 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) open(0x0, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:01 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2288, &(0x7f0000002580)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:13:01 executing program 0: request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) [ 281.778688][T14772] loop5: detected capacity change from 0 to 264192 [ 281.839329][T14774] loop3: detected capacity change from 0 to 8 19:13:01 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 281.938652][T14774] unable to read xattr id index table 19:13:01 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$khugepaged_scan(r0, &(0x7f0000000000), 0xfffffffffffffedc) 19:13:01 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) open(0x0, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000400)=""/147, 0x93}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/53, 0x35}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e0077f) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf8, 0x0, 0x0, 0x800e00546) shutdown(r3, 0x0) [ 282.144803][T14797] loop5: detected capacity change from 0 to 264192 19:13:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x0) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:02 executing program 3: syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a10200000000000001", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:02 executing program 0: keyctl$get_persistent(0x9, 0xffffffffffffffff, 0x0) 19:13:02 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:02 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) open(0x0, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 282.697958][T14812] loop5: detected capacity change from 0 to 264192 [ 282.734158][T14817] loop3: detected capacity change from 0 to 8 19:13:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:02 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:02 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:02 executing program 3: syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:02 executing program 4: syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r2, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r1, 0x0}, 0x10001) io_uring_enter(0xffffffffffffffff, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 282.995790][T14831] loop5: detected capacity change from 0 to 264192 19:13:02 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x0) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:03 executing program 3: syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:03 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:03 executing program 4: syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r2, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r1, 0x0}, 0x10001) io_uring_enter(0xffffffffffffffff, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000140)) [ 283.647722][T14858] loop3: detected capacity change from 0 to 8 19:13:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:03 executing program 4: syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r2, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r1, 0x0}, 0x10001) io_uring_enter(0xffffffffffffffff, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 283.690908][T14862] loop5: detected capacity change from 0 to 264192 19:13:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:03 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:03 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 283.903572][T14875] loop3: detected capacity change from 0 to 8 [ 284.073639][T14887] loop5: detected capacity change from 0 to 264192 19:13:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:04 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:04 executing program 4: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:04 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 284.601544][T14900] loop5: detected capacity change from 0 to 264192 [ 284.641579][T14906] loop3: detected capacity change from 0 to 8 19:13:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:04 executing program 4: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:04 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:04 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') fallocate(0xffffffffffffffff, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 284.903314][T14920] loop3: detected capacity change from 0 to 8 [ 284.985987][T14925] loop5: detected capacity change from 0 to 264192 19:13:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:05 executing program 4: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:05 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a10200000000000001", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:05 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') fallocate(0xffffffffffffffff, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 285.576780][T14940] loop5: detected capacity change from 0 to 264192 [ 285.584108][T14942] loop3: detected capacity change from 0 to 1 19:13:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 285.620769][T14942] attempt to access beyond end of device [ 285.620769][T14942] loop3: rw=2048, want=8, limit=1 19:13:05 executing program 4: r0 = syz_io_uring_setup(0x187, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 285.689042][T14942] SQUASHFS error: Failed to read block 0x0: -5 [ 285.713291][T14942] unable to read squashfs_super_block 19:13:05 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) 19:13:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:05 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') fallocate(0xffffffffffffffff, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 285.966376][T14964] loop3: detected capacity change from 0 to 1 [ 285.987131][T14963] loop5: detected capacity change from 0 to 264192 [ 286.015842][T14964] attempt to access beyond end of device [ 286.015842][T14964] loop3: rw=2048, want=8, limit=1 [ 286.044820][T14964] SQUASHFS error: Failed to read block 0x0: -5 [ 286.057186][T14964] unable to read squashfs_super_block 19:13:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:06 executing program 4: r0 = syz_io_uring_setup(0x187, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:06 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) [ 286.525219][T14980] loop3: detected capacity change from 0 to 1 [ 286.533776][T14981] loop5: detected capacity change from 0 to 264192 [ 286.559161][T14980] attempt to access beyond end of device [ 286.559161][T14980] loop3: rw=2048, want=8, limit=1 [ 286.559228][T14980] SQUASHFS error: Failed to read block 0x0: -5 [ 286.559257][T14980] unable to read squashfs_super_block 19:13:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) 19:13:06 executing program 4: r0 = syz_io_uring_setup(0x187, 0x0, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:06 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) [ 287.032504][T15007] loop5: detected capacity change from 0 to 264192 19:13:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) gettid() fcntl$setown(r0, 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:07 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r2, r1, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:07 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) 19:13:07 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:07 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r2, r1, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 287.522382][T15023] loop5: detected capacity change from 0 to 264192 19:13:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:07 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:13:07 executing program 5: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:07 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 287.763874][T15037] loop3: detected capacity change from 0 to 8 [ 287.795769][T15037] Can't find a SQUASHFS superblock on loop3 19:13:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) gettid() fcntl$setown(r0, 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:08 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r2, r1, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:08 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:08 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:13:08 executing program 5: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 288.476786][T15057] loop3: detected capacity change from 0 to 8 [ 288.505859][T15057] Can't find a SQUASHFS superblock on loop3 19:13:08 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:08 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:13:08 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, 0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:08 executing program 5: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:08 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 288.751196][T15072] loop3: detected capacity change from 0 to 8 [ 288.772476][T15072] Can't find a SQUASHFS superblock on loop3 19:13:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) gettid() fcntl$setown(r0, 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:09 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:09 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, 0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:09 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:13:09 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:09 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:09 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:09 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 289.513387][T15099] loop3: detected capacity change from 0 to 8 [ 289.514817][T15097] loop5: detected capacity change from 0 to 264192 [ 289.563850][T15099] Can't find a SQUASHFS superblock on loop3 19:13:09 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, 0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:09 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:13:09 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 289.734475][T15115] loop3: detected capacity change from 0 to 8 19:13:09 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 289.775570][T15115] Can't find a SQUASHFS superblock on loop3 19:13:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:10 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:10 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:10 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:13:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:10 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 290.403163][T15134] loop3: detected capacity change from 0 to 8 [ 290.411308][T15136] loop5: detected capacity change from 0 to 264192 [ 290.425310][T15134] Can't find a SQUASHFS superblock on loop3 19:13:10 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:10 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) 19:13:10 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:10 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 290.726515][T15155] loop3: detected capacity change from 0 to 8 [ 290.786348][T15155] Can't find a SQUASHFS superblock on loop3 [ 290.810795][T15162] loop5: detected capacity change from 0 to 264192 19:13:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:11 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:11 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) 19:13:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:11 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), 0x0, 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 291.401010][T15177] loop5: detected capacity change from 0 to 264192 [ 291.424473][T15180] loop3: detected capacity change from 0 to 8 19:13:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 291.504635][T15180] Can't find a SQUASHFS superblock on loop3 19:13:11 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, 0x0, &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:11 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) 19:13:11 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), 0x0, 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 291.764007][T15201] loop3: detected capacity change from 0 to 8 [ 291.801807][T15201] Can't find a SQUASHFS superblock on loop3 [ 291.815568][T15203] loop5: detected capacity change from 0 to 264192 19:13:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:12 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, 0x0, &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:12 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e7", 0x173}], 0x0, &(0x7f0000010300)) 19:13:12 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), 0x0, 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 292.355960][T15219] loop5: detected capacity change from 0 to 264192 [ 292.371749][T15222] loop3: detected capacity change from 0 to 8 19:13:12 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, 0x0, &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 292.488275][T15222] unable to read xattr id index table 19:13:12 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:12 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x173}], 0x0, &(0x7f0000010300)) 19:13:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 292.737241][T15244] loop3: detected capacity change from 0 to 8 [ 292.742803][T15241] FAT-fs (loop5): bogus number of reserved sectors [ 292.759495][T15241] FAT-fs (loop5): Can't find a valid FAT filesystem [ 292.793414][T15244] unable to read xattr id index table 19:13:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000), 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:13 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, 0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:13 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x173}], 0x0, &(0x7f0000010300)) 19:13:13 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 293.262969][T15257] loop3: detected capacity change from 0 to 8 [ 293.283169][T15258] FAT-fs (loop5): bogus number of reserved sectors [ 293.307874][T15258] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 293.335192][T15257] unable to read xattr id index table 19:13:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:13 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, 0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:13 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:13 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x22d}], 0x0, &(0x7f0000010300)) 19:13:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 293.700170][T15281] FAT-fs (loop5): bogus number of reserved sectors [ 293.717506][T15281] FAT-fs (loop5): Can't find a valid FAT filesystem [ 293.775474][T15287] loop3: detected capacity change from 0 to 8 [ 293.810939][T15287] unable to read xattr id index table 19:13:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000), 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:13 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, 0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:13 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:13 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x22d}], 0x0, &(0x7f0000010300)) [ 294.292345][T15303] loop3: detected capacity change from 0 to 8 19:13:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 294.359136][T15303] unable to read xattr id index table 19:13:14 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:14 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x22d}], 0x0, &(0x7f0000010300)) 19:13:14 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 294.581597][T15317] loop3: detected capacity change from 0 to 8 [ 294.617550][T15317] unable to read xattr id index table 19:13:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000), 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:14 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:14 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x28a}], 0x0, &(0x7f0000010300)) 19:13:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:14 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 295.203448][T15338] loop3: detected capacity change from 0 to 8 19:13:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:15 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:15 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 295.327847][T15338] unable to read xattr id index table 19:13:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:15 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x28a}], 0x0, &(0x7f0000010300)) [ 295.516694][T15357] loop5: detected capacity change from 0 to 264192 [ 295.563401][T15361] loop3: detected capacity change from 0 to 8 [ 295.585697][T15357] FAT-fs (loop5): bogus number of reserved sectors [ 295.592338][T15357] FAT-fs (loop5): Can't find a valid FAT filesystem [ 295.610171][T15361] unable to read xattr id index table 19:13:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:15 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x0, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:15 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:15 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x28a}], 0x0, &(0x7f0000010300)) 19:13:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 296.133217][T15377] loop5: detected capacity change from 0 to 264192 19:13:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 296.175433][T15378] loop3: detected capacity change from 0 to 8 [ 296.195374][T15377] FAT-fs (loop5): bogus number of reserved sectors 19:13:16 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x0, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 296.262107][T15377] FAT-fs (loop5): Can't find a valid FAT filesystem [ 296.306167][T15378] unable to read xattr id index table 19:13:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:16 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:16 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x0, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:16 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f020000000000002880000006007861747472310600000078617474723100", 0x2b8}], 0x0, &(0x7f0000010300)) 19:13:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 296.599117][T15405] loop5: detected capacity change from 0 to 264192 19:13:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 296.643715][T15412] loop3: detected capacity change from 0 to 8 [ 296.648884][T15405] FAT-fs (loop5): bogus number of reserved sectors 19:13:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 296.692117][T15405] FAT-fs (loop5): Can't find a valid FAT filesystem [ 296.716171][T15412] unable to read xattr id index table 19:13:16 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:16 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:16 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2b8}], 0x0, &(0x7f0000010300)) 19:13:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:16 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 297.026211][T15436] loop3: detected capacity change from 0 to 8 19:13:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 297.090800][T15440] loop5: detected capacity change from 0 to 264192 [ 297.114564][T15436] unable to read xattr id index table 19:13:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x0) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:17 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2b8}], 0x0, &(0x7f0000010300)) [ 297.178843][T15440] FAT-fs (loop5): bogus number of reserved sectors [ 297.209941][T15440] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:17 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:17 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 297.373032][T15457] loop3: detected capacity change from 0 to 8 19:13:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x0) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:17 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 297.467515][T15457] unable to read xattr id index table [ 297.506691][T15467] loop5: detected capacity change from 0 to 264192 19:13:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) 19:13:17 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2cf}], 0x0, &(0x7f0000010300)) [ 297.584703][T15467] FAT-fs (loop5): bogus number of reserved sectors [ 297.623457][T15467] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:17 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:17 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x0) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) [ 297.871919][T15485] loop3: detected capacity change from 0 to 8 19:13:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) [ 297.955134][T15494] loop5: detected capacity change from 0 to 264192 [ 297.965619][T15485] unable to read xattr id index table [ 298.007996][T15494] FAT-fs (loop5): bogus number of reserved sectors 19:13:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) 19:13:17 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 298.064260][T15494] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:17 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2cf}], 0x0, &(0x7f0000010300)) 19:13:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) 19:13:18 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 298.272255][T15512] loop3: detected capacity change from 0 to 8 19:13:18 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 298.360937][T15512] unable to read xattr id index table 19:13:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) [ 298.408777][T15520] loop5: detected capacity change from 0 to 264192 19:13:18 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2cf}], 0x0, &(0x7f0000010300)) [ 298.458281][T15520] FAT-fs (loop5): bogus number of reserved sectors 19:13:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 298.501293][T15520] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:18 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:18 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 298.679646][T15533] loop3: detected capacity change from 0 to 8 19:13:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 298.768096][T15533] unable to read xattr id index table [ 298.883809][T15543] loop5: detected capacity change from 0 to 264192 [ 298.949336][T15543] FAT-fs (loop5): bogus number of reserved sectors [ 298.974603][T15543] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:13:18 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:18 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f0200000000000028800000060078617474723106000000786174747231000006007861747472320600000078617474723210800000000000000000020000002400", 0x2db}], 0x0, &(0x7f0000010300)) 19:13:18 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:18 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@multicast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}}}}}, 0x0) [ 299.270779][T15555] loop3: detected capacity change from 0 to 8 19:13:19 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@multicast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}}}}}, 0x0) 19:13:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 299.362076][T15561] loop5: detected capacity change from 0 to 264192 [ 299.384869][T15555] unable to read xattr id index table 19:13:19 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 299.416275][T15561] FAT-fs (loop5): bogus number of reserved sectors [ 299.483493][T15561] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:19 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f0200000000000028800000060078617474723106000000786174747231000006007861747472320600000078617474723210800000000000000000020000002400", 0x2db}], 0x0, &(0x7f0000010300)) 19:13:19 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:19 executing program 0: syz_genetlink_get_family_id$wireguard(0xfffffffffffffffe, 0xffffffffffffffff) [ 299.689659][T15574] loop3: detected capacity change from 0 to 8 [ 299.772020][T15574] unable to read xattr id index table [ 299.793393][T15581] loop5: detected capacity change from 0 to 264192 [ 299.835573][T15581] FAT-fs (loop5): bogus number of reserved sectors [ 299.842852][T15581] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:19 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@multicast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}}}}}, 0x0) 19:13:19 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:19 executing program 0: syz_mount_image$btrfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002600)={[{@device={'device', 0x3d, './file0'}}]}) 19:13:19 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2db}], 0x0, &(0x7f0000010300)) 19:13:19 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 300.270864][T15594] loop3: detected capacity change from 0 to 8 [ 300.304825][T15597] loop5: detected capacity change from 0 to 264192 19:13:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000034c0)={&(0x7f0000000040), 0xc, &(0x7f0000003440)=[{&(0x7f0000003500)={0x14e4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x11f9, 0x0, 0x0, 0x1, [@generic="5f5ab0afc45a02d7e1d6eb2f99ce879648cab0771665aa7cb5cadaf4ae3215261d91cf85b9a1842bf2161643bab2623e0709c79d063c26d676a90ca40373d047affeed0856fd4f3e923def938eb194ebb108d2ec440b8bebbe5b722e41f3f1fff8c4f698dcac61ff0252d5459ec197a8fdfce569959cd4adbb9766b68d287beb3a8c5b2716f0bb2d4346fefedea33a7f84a570d43afbebe89241cac4c4fb2ce56355d0254df6517311205db2ae4913ac134f5bde4ffcca097e7d9a499889fb92ae8898bcfa9855e53f7cd0858628e9c193719427c1bef5882ae9870fc5c3e61c583006f142b0a8e3cb8434b7", @generic="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", @generic="3d7d3d09e3de43026401ac5af5b97fee625a992b751aff72a6be4e7ad6455b0b2ba8222b576e7bb1e1708f67a28685e27d8f3a13fc9b09cdc2b6178ce62b37203dad5c972ff932efd382749a271db11c172e6239612ca9734d3f838a6c1aab0d5f1f317a6adea0f9a17c2a400f566aa2ded4b6ccb23d2e7c78f11bd4f5debf1571855d3ae09b69721730a6c9d179717d538be64b60ab3508069a740944", @typed={0x5d, 0x0, 0x0, 0x0, @binary="4ee81eb9df37096857642d8166ee57450fc9a3bab3861b037942bb465ccf73d77a29dfeb3f9101f1bad632ed8c26d4b603efde4eafc5ba0f9399274c08cd7a71f0cb39f79a01275071dc4d6f987f3104267dd4014eabe5ceae"}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @nested={0x1c9, 0x0, 0x0, 0x1, [@generic="7c0699af0c0f2f69df1d17117fd020d2d48cdfc3a6e8f61190927d9e6f205ed8977d46a71096dfa5c593b7e7a73176c818fe13e725509a80a61d15e24b0964d429487d1c9efe9902ea7411ae905a9ee4549732a55d41ee9aea4816b3ad6706c4a1c5885403362581c90a028f16ed5c555d40d3d815ddfe4f45f83238da8cf57e0934c5da1eab3693caec82de95e87717c0d9a49a1425b07f87b8e2e8ff29f0a870a6342166f22648d218bf1082c4cc63fbb0d4d324f9793a60f4", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="121e39fca60141f9deff3a826658a206fbddb074591988ff3b825705c3c48941fe0499fc26852f4997f508ed9697dbc0753fc78d5e2266acc07419a42b74959b9718248aa53744c43f0c4f7b7fc9642061fdefe5e9dcd43424c7605b0ad6f516de7c9371471305c1a62454019de8fde94c8d78ac3e0b8559ef61edc9b115cea0361f814be28ab33c0f0f4c8fb0f199990c4bfc9c3cee8979ebdedbc99290ae0b", @generic="17eafec70aec701a23dd6a7e64aefeca71168cf76488df43630556481b06679d137a466b6c0b5e13267593e950d265a9f75d794c2f19d6ece5644fee8035b7394aeed5ed0d2ac115d3056d5237a3de258fc012b6fb6af436267d3f", @typed={0x8, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}]}, @generic="b77d16720f59d1fdfb5aeaa7848719f182f00232c4881aef8043b1567bec68ce0d40e6a85bf5a3f6e4b0f94f6af7eeb7ddc85cead0a3b6f97ac7afd6ff366e2604b1313812bfccb3437681bfd0023f3c44bd384592b2db19dd4e3af24812fc0bbc624cd9f7e74eb176f4172f2a7fa736031801b3abcafe6e9f877a50c5c611f5b6d687117eafb59a2fa141c75e679cb6f9296ba7a62773a173695e7e149c185a09636ada66502dc9cd033603b3192d4383912381c5eac9f92dd4f5594fbe", @generic="d8f86fa63b7daff23cc59ac64465b6ee7ea41020b450", @generic="a106d53cdf1854c4f52b7f3041d76ad880122a8c152fe7dff1"]}, 0x1ec4}, {&(0x7f0000001600)={0x9e0, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xd5, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x6, 0x0, 0x0, 0x0, @str='}\x00'}, @generic="36918aaf24ffa8bf68f0d76ad9a5adbeb8216803faf18cea2468230f9e5e35708aeb7f443646ae51c7d26e2a8a526b30be91df0de2f2cb42c5a1cd5ab4bd55c6e1ba09e42cf15957f21f1cf94edd988d9fd6c71e470007307ba085503c4aa656a4721511acf03b990498b37d2e832b3290a4d206cc2ff5f6f2b8fe82d21aa5021fa1c6bcd7d644614afa217b23d21f6f64321fc87afc43863aac6982ff6607f423b1efb0d425b613eb2eb0140c3fd9a9743b80656a8a2614698371beef4b8453f4"]}, @nested={0x8e9, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private}, @generic="7d73d22fad8db22a83f86d847044d9290dd383588046129f6666f24ff3959ec0afede57ccc02879888c65d4951810bf2d55624acd0bfe4abc04e08b35b184cb3f441f7e1121f00d7fb48061440e4f90be51dad8835f972dcbc8a7df08b45238464b29c4404dd1218ec02e779bcd3e733", @generic="69ef2ad85c9ab68f75ee873e125f3031b023d689683efe5221a2e0b59826410060158e6953b594aae2453e02a80df7535d8f6ff8ac3dc24b2993433a26365458fd63552ade8dad86c092fcedccb100f7a067efed1422e7cddeecaa1d85ca7e06d107eec7ed04af7fe4f1eb72a12f24ed58ce395f3c945ba4084420122a6840ce8e16bcba7e5797c5adbc3ad3003e32a2975d9932293f86340a0ff80b94d1d23b5b", @typed={0x7c9, 0x0, 0x0, 0x0, @binary="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"}]}]}, 0x9e0}], 0x2}, 0x0) 19:13:20 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@multicast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}}}}}, 0x0) [ 300.366238][T15597] FAT-fs (loop5): bogus number of reserved sectors [ 300.368141][T15594] unable to read xattr id index table 19:13:20 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 300.421599][T15597] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:20 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e1}], 0x0, &(0x7f0000010300)) 19:13:20 executing program 0: r0 = socket(0x26, 0x5, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 19:13:20 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) [ 300.643581][T15614] loop3: detected capacity change from 0 to 8 [ 300.674653][T15614] unable to read xattr id index table 19:13:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, 0x0, 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:20 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:20 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 19:13:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b4a, &(0x7f0000000080)={0x0, 0x40}) 19:13:20 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:20 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000", 0x2e1}], 0x0, &(0x7f0000010300)) [ 301.269458][T15630] loop5: detected capacity change from 0 to 264192 [ 301.289381][T15632] loop3: detected capacity change from 0 to 8 [ 301.316885][T15630] FAT-fs (loop5): bogus number of reserved sectors 19:13:21 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 19:13:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)={[], [], 0xa}) [ 301.363530][T15630] FAT-fs (loop5): Can't find a valid FAT filesystem [ 301.399179][T15632] unable to read xattr id index table 19:13:21 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:21 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:21 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e1}], 0x0, &(0x7f0000010300)) 19:13:21 executing program 2: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@link_local, @multicast, @void, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1, {[@timestamp_addr={0x44, 0x4, 0x58}, @timestamp_addr={0x44, 0x4}]}}}}}}, 0x0) [ 301.679806][T15654] loop5: detected capacity change from 0 to 264192 [ 301.704027][T15656] loop3: detected capacity change from 0 to 8 [ 301.708676][T15654] FAT-fs (loop5): invalid media value (0x00) [ 301.722728][T15654] FAT-fs (loop5): Can't find a valid FAT filesystem [ 301.757376][T15656] unable to read xattr id index table 19:13:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, 0x0, 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:21 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @local, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @rand_addr=0x64010101, {[@timestamp={0x7, 0x8, 0x5, 0x0, 0x0, [0x0]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 19:13:21 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$get_persistent(0x11, 0xffffffffffffffff, r1) 19:13:21 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) 19:13:21 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000002680)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000005800)={0x1eb0, 0x3c, 0x1, 0x0, 0x0, "", [@nested={0x1c, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, @typed={0x8, 0x0, 0x0, 0x0, @uid=0xee00}, @generic="8508ac4baef4507ca098995868ed98fab5c18340352a19fd156ff01b32988669d3bdcabe188ceb7057f0a7cc64afc8527fca93d496cd047fb23e77f21855ea168252fb1a3e7173fe604580326248ac783bb1d76b1e3ed04b8bba1842adb03c92ad00d211be039efc3127eea4c4d3bf92ec9d5e1121d98d2d128a33ee8288771f86fa0062c7f7253199b9bd69988baf41371aa547bd170db2125b555eccd8be9c1e3c6e2da4e33e177db4f2345234e4d6160562a15f8c565fa45c553f690e04339a43c62ff78b55fab5441500e5a9f089f6", @generic="1d6fe7c41e3d2776fafb4a88162d3c6f83b35b514a17dc44a21d85f718fde6795bb5e7756ea01ccfe9942343e84f469986ebdf30748d6559c91a7d8c42c9ffc8ea805589d664711081fd7402c3e3bd2948aa22ad0a7c6b84bf2ca8a6b0b90304f9a986feedb9b1dbe6058e9c307fce1d519d44fa61459b79aff85c4e8d5a078b9f2f8bdbd07e1c17a2b456f44e3c64da36085d9e6b4e4f849ff04cba17ec08fbee1898f922d40068f03785d46088ccc51d655c3a7d82743db059467f2492e289ab5a0bc13680fa9ebf5a122b2d1049e86bbc4531308862a70e4617fe9986caab40d9cb6230739c16a9e804c314522406e24064e4c9d7186a4c", @nested={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="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", @generic="d3db387b48e15e69b537ef3d306afc74ba039dc6bf93117141614249a9cf6126a6d16e42a913538e2b1b445b5b9ff944ee410666577b39e2aa29da65dffcea6b89ca301d3a879d782455985552deca4c6803a4d59e540905d886f118827819853f51f1b46d0e400dde2e8d3cae3211e5a7d4b082d625239ab009244c060a9a72ecbe627c5b9391578054172b3ca5f90ec86042aab374b464096a00853ad9bc3de948b67d31d7bf188cb03580c66ea6a0fe4c9b3f70caf4d7336fea692246c3f0f53a6d2231b719315baa44e136d99bd3517ce308b6ec3f435ee5c1602aa7b9af4d53794135e2a62226de355921181a2f29359c30f9d7292c243f032126a4f163fddbd33efc609f1a69f0fa19f701986ac629a2f4410b789a4a9bc74508ae414e187b62c54ba8c269a3ce062cfdf8c513eeea21c604409e4eb4548ba8caf3fa88a19512fd66e136bb04a4507babb5cd531797417558069f83650c5945242c0f03ef8f8a88660a7b739b721f4aada5c0c334e80ab7e843ef0957f6d6a1fc5a170ad7c5f1bfc68e5df72e059ad8cf28834c339d7e0fff729738cca0933c37875ee67cc1fcee133b03352019ee81abe75e688a725f0cab98ec99eb95d76477737a7b16948e39f108ee2cec55d44ed8d889a9c61f443049d24f9a04246e65e504aa83c485d41efb96cf113c69394ef89c2f0e0b1d5982bb1ca189537287fbb5d259db19b089b2f1da90b7f8bfca83619cbf0f6fe5b1d5f620e1de85f4c60fef861c282304878e4fc3185dd6e8c84be3a657d6b40755c99ab0e4c3a83267bce5d3cb65f85874300e65bf5fa3cc68882d5ec0eebc1122f2bf14f3df5ec3de19ad202ea12f4f138957b77055ba544a89b021a0c9078d56491c787bbcd5ddbbc81a0fcb6795a32bb3ca3cd21a249c513141f59e054bde2b493aff710720096a79d4b9930d1763bbb9979ceabc8e64f5e51b01d3c7ea20969b421d41dbbc113270f9c46d9eb97b26cc1aeba6cac778d1869788592150c617645f14a39e3510a2db58734b7567289ca0c4db29cfee1c50ab0bdf1273e4072f8893b0fbd87b3def7327b5da1856c29b8a597b352e3a88f24d695b735828b5f0fa7de5b1c327e328ecc9248cb549dd07e28c10513c88c9d6fce88a596ea5060c3e7b8e0676439748f3f39c55a5292e488aac41d30ba1de8c89d4ff02f59b94896e073892e49ea7ed8f2c1ec1bdca8f4f1e525e2f5cd058ddd51a458af4cad2435594d052baf1819a5238f16fb9456a52a1f2dee11f8bdc0ab8c1e022b952b6692ff3698a866faf451b253b7d3f9b5edc912b71bb75ab7085162fa20daba558d813c0372050c9e7aa1a122a05c25774a9fda6be90dc4edb5ce016ba88a187c4320f1009f4fdc19d1acee0af9230e64286ddf3bd0bd2a4d0e87204dbc07e12e6389b125b14f56f825887326ac68f34e0f543c396e51cf26abe9b5b861d648bb6ce4622461420c312ed69c1e3d789ecb6efe1036b119d18fc3101c552ce53d48e0e51b5dbaa5661f72fbc00930d1ef37a2507d44a9f42e07ce6409022aa60c282b004a74ecb267e29d9415b2ddb1ca624477b4898ef8ba3692a4f2bec2e31a37c64463f343cb4519667cc5b376eadf852609218ad2d28a2b9cd7ef990c724c09b33ec52d7a18952f398ef8c8d451b12c7e77795b3c82e52d838737ae62a3a50be519ba61e501938898932365d433dfab8e22fcb308cdba414715a3bb3f30c50adbec675227a66ba09a476efe1221e44b278fd4be224199a13cf5bc37eb5de0e118bc0dd64c42cdb0f4abd2c98e9d7e1cd9fd038fd17a25a656873880532b0b0cb7c38600472a22d24dbb860c825d7e0b182e932c811dc99959884f21a052750041a4ef6a60a47aebbd7897510c8357c702ed22ddeab9973b1a23a9c1307f1252302b8b7d0221b7fd0f00df66a3b01225e0c0a7fdc7c05af7177439dce8503d1961fc561fa5b176ecb55f374b8a1780eab5ff0569170c57d28925056b5a514b40590db211e2471c0ebacc01a4e35f0520926df2d25e34368de7c6def8e82e0b09c35efaf279766d6406765913ba3f4c9a0dda4f9d57a2072165fa477c1520e0f3e0d77001deb7d5d3f67aa4caa6c3976a24eb0a457410543c4c26557129b75d4ade16b66d66893c9e02ff49741be503ceaa3b63199d9709c6025796039438e30bae16007584de18a047f7a9e8ec889255ac823f6f1e1c07e8904f173e86aac9b13c092f227c6d379b3637833844beb69d6e20d0b0278ae18972ddb65358fdb1cb40b412e42d41b1ccb38d4a562a33bd21b66c64f9dec14853e6b4c9413cec6b8f1a42f5094fc40179cdb3826755872bac078223073977413a0cc1a46420b75061dfd14cc01e8d2bcade493e463d3998eda0c6526c16105eea62c3ce3c5aef773020ecd2ef84c616d4120d89acaab2905f7187e879fb33ad0008f9351c06c47702de71dd83689ccb6d9e2bbdbe66f4b606fd126252d458e372abd603a14ce2dd5aa8ea18746e093f8dcb44ef29c2eae3cbc25761e2f05bb6b0153a9dbc17b0f0f8e8649d482b312fa26925cd6a4773d4712eaac919334f2f5fc5fba2e929a1836e3203e4571579cca2200f4d39606af5e13100c75164061e6490e27f7e96359fdf597bf71d02e53be625559744f0d71a9bc84443e46e52e80853fc1dad71354064f53c6cbc140193960f6cb14b9ebae783adad7f8627095d5b021cd522b9ca977d50f6fc93bbb462feb29412b0f7787e534f02af2779b5b835ee881a7eb55f9bc9193c43548dce0d5deb422a71fc7d156800c8ea9aafefbd2e484bda720ce7cbf24bc7978e2b6220525f4034bf2397bf2cf1e3eae49fb07f4492a397081fa2450f14bf2444a9f057ae4ebd8ae6f052137fb8abcc66b8a49727549a4dd757cde4b72abd59eb696dbfbd366e5e47eb645b0ed327f1f4fa225285acb0a1d29b3867b5589eaca7c1191325ca7ab659acb11bb8594c49587779b618c8857076f0bdb5d3f7f77e2deaa0a41153ea669b53aa044a1acc9594b41cbb4e3dbb593b7de3d2b8b1c8b9d8c2770320000dd4fa36138aecf724ab8ac81bea33e526ab47f6587c239cdcdfebf35ea49392855529d17067f59e21a7141ead3dd5dc78f77baea933cf1751e6dc693b827bc338de34a2727152258e262225d621e412b483675e67fc3faaf5d23a6ea1698ad1dab33ff93883d3846eded1057cac2d2403b4556683f98efe3ea3f971bb8b4d9dd0e9d441a89fe5d5672b3a54f8daba621cf9d5d67782345c9b8b513ccf78b924de46f889e82d663f1337551f066dc8b66b7a551c62773970a0ab6a81c59ff0b15a7f08d7413f64d7baf180f0b48bcefbce1bf34c7a0bc4a261c0b761b707716db7bf4361d489883b69ea6e899160b94be1967e5c5492ecbeb814b0d5e3cf24640b25a0af525501638ad1fd17f1c6c91bb2e6feabb971cce0db8bb10494ce1a4332500bb2ec49bd24543e33f201b345760203eb5f715fc171954eb9f95a83632b63bde842b9350c136b46452f5133d667e0d65f79e2d7768e923a3a23b97c3150c3f0221245eba9dd1a8bf943bc0c6b97b70d7cfa80a5e4da70f28a85786b5ec146c4abdde4e74881ad662dbf29f169c5a84faf23dd61b91228cbb9086256c5fc8c8ee652fbdf830d47263b30f9fdc0f50f4053d055ea692dd6a162b73f68cd18eb1aadeccb8f691d5b954b2af10a329448628ebb1c505423fbff9b715852ca8c76a51c455ff9c4606ed8795bf8de5c0bab8f0711469ba445854543cc395e97279a3981d2a7536604a0ad1ee328696bd505edb0d91717ad901022a3062b178143d21c83bfc761db093a24033abaad869fc3b940b978c041b4a28218e49623172fdc9d578553cb6a8e072a02c6b498c12e84af2bcc2571f6c4cd3408bc227143d44ceb0c6304dfce9b3a2d02561dfd5157fc1bf68a9e698886bd067f57f84f9ef0ecd0eeed6286441671851127c34e47c7b8c2734511a40eaa6879df593195c4a2a3ecf211a53f9737384ae18f2a56697a8fe3dd4e4f2b8a88df7194ecaa74df9bb83f499c64297ed80ca7a6df636c8cc0cd408121e64a8da7b15506f6a64ea8038e1ca4374af225bb4f3644845c02b4e7765c8b93d794465ffbc01538c4a2032a529418ff3eacdab77cda645a3a0204f2a1ff45e449d0d416b01b2ed483292ab6540eb502187bef5881a1136791fa035f6fd5590dcb8c144cc9e185ba322c0b4e5f071b2532f0fbab9f111baa455f6ef8b65af9ac28307a1292b7ffe695d8fccc54255e8e2126e571a6ca5bfa82fb9cf6cb4b86c5e4c1b0aa26fb219714284093a7f7ced2d44b9decb4e0f8811b3dc5a0f4c820604d2407d9553b8e6bbb3679ab75a1152c8a1db769e0bd99209d180da5790356e4e91bbe3961727eab0b5ba73d7ab2062339e908a504d8b550e9060c86a92539da3248f3efda973d2f4ab22dd395791e76192edc2b1def0430f8101440432d3081a8f4144e76f83eb6eb120f41665caf77735a918d8627010f3695a7127aa6746ee997daa158df9193b2f71af01d4fec0173b2ee2fa"]}, 0x1eb0}], 0x1}, 0x0) [ 302.242342][T15676] loop3: detected capacity change from 0 to 8 [ 302.279905][T15678] loop5: detected capacity change from 0 to 264192 19:13:22 executing program 2: keyctl$get_persistent(0xb, 0xffffffffffffffff, 0x0) [ 302.342899][T15676] unable to read xattr id index table [ 302.364805][T15678] FAT-fs (loop5): invalid media value (0x00) 19:13:22 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 302.389008][T15678] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:22 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000", 0x2e4}], 0x0, &(0x7f0000010300)) 19:13:22 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:22 executing program 0: fanotify_mark(0xffffffffffffffff, 0x11, 0x0, 0xffffffffffffffff, 0x0) [ 302.617575][T15696] loop3: detected capacity change from 0 to 8 [ 302.635116][T15697] loop5: detected capacity change from 0 to 264192 [ 302.644808][T15696] unable to read xattr id index table [ 302.692001][T15697] FAT-fs (loop5): invalid media value (0x00) [ 302.718630][T15697] FAT-fs (loop5): Can't find a valid FAT filesystem [ 303.065526][ T9717] Bluetooth: hci0: command 0x0406 tx timeout [ 303.071895][ T7] Bluetooth: hci1: command 0x0406 tx timeout [ 303.078941][ T7] Bluetooth: hci3: command 0x0406 tx timeout [ 303.084985][ T7] Bluetooth: hci2: command 0x0406 tx timeout [ 303.092050][ T7] Bluetooth: hci4: command 0x0406 tx timeout 19:13:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, 0x0, 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:22 executing program 2: mknodat$null(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x2000, 0x103) 19:13:22 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, 0x0}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2287, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:13:22 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) 19:13:22 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740e", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000034c0)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003440)=[{&(0x7f0000003500)={0x14e4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x11f9, 0x0, 0x0, 0x1, [@generic="5f5ab0afc45a02d7e1d6eb2f99ce879648cab0771665aa7cb5cadaf4ae3215261d91cf85b9a1842bf2161643bab2623e0709c79d063c26d676a90ca40373d047affeed0856fd4f3e923def938eb194ebb108d2ec440b8bebbe5b722e41f3f1fff8c4f698dcac61ff0252d5459ec197a8fdfce569959cd4adbb9766b68d287beb3a8c5b2716f0bb2d4346fefedea33a7f84a570d43afbebe89241cac4c4fb2ce56355d0254df6517311205db2ae4913ac134f5bde4ffcca097e7d9a499889fb92ae8898bcfa9855e53f7cd0858628e9c193719427c1bef5882ae9870fc5c3e61c583006f142b0a8e3cb8434b7", @generic="0341d48ff3860cc1b896e89fb7d72359c3110f976e118e4fb263b3be5a2e22aca1b8526ac8af6058f005da70b96a8cf4e03040c76c56ec12116f163e02aa2860a68b2f7cfba3db7c3092d420f019bbcb9b5cc68453e73a14b9087df0bf97fddc3566cda2f3fcc926ee304871a159edb726d3ec6276ffe35b7b6af6ad0a452ba4b9ed105ed7d9301dc3b67b91d4784e8bd3717ff56cd70c060e0b645c803614817ecf6dd78ae85c3c1dbb0629de68d18486329dd56e0684ff330c46dc9a7ae0afaf3dd49c69009c125c2a05c636b7e1e5160390a598855f02014d28f30e4fa142b4c3cc2ae3d2fb0a49b6833b75540a37ae25fc1af592d83a3f44deba9f3da1c044437b0f811b871ae43afb1bdd16f6f4cb6d2b2822c2bb3af0b9e3048a3e236c3b65dae662539940c34259def5746f24453b3304d56979fd9ae82a751872ab5cb31267d9429319ae3efc0279010cfd1f2d166286a3338605496b1cdfe23632e742c819160c49d4b4288ec178466e84e93c90167d674dffa008c51c780a70e183fff1846479dca960114544ea5b3c5a51c24abd9518785e5b10dacdbe4c87db8c92dd391dfba8fee37cb7170960f3065b317dbd752e87379bce5bab99b790fcbc368f048a1979926fbe8f7e751d8d6bdfa774346d7915619c14afff4a65f84e89e312e8f93a355a0cbe99b3df8137cb8c7d401ef441d38d284e8fb5811a198e8abc5396d054f07ec1cd810fa27f9a6a86239a13a15c776cfb2b0597aec92629a2081bc809771f8cc4b86d532d9d1439b61bc3fd97e0faa97e804012df651e5d30b8b7cf5bc6935e02278370393adc59c7b5e419591cf23bfd79c230ba86d54c016102a6560daff53e9b320bd3b7058ff5f9515f87279b998618dc4d1ba6691b26a18efade2cc8a6f0a6e236d6e29764c2b33fb9f0ba66efbbcf28844795839c00dcf2c7b939f3f58eeee4fabdd8075276e959628c0536bdb7ecf9a7d7a15dd03cc1fe20b072f7ae26cc17cd4cf3a447239022f17b8afdd50edab43c88ba493125cdb7d30b46aa3325539040d4c3b38322fb630854d1473b681722f6331595b8495cea18a9dc9d10aae454b993eaec9d15bc592805d7d9f0b1cd145ea91c604a19c4f8367da1f98ac92530ccce65ab0b3fa598c1618fd6218e12e161617c3e56ee79e8eee169dc05f235037b88336f560b56b4d1c4ee9ece9e46063d0f77dc9c9d0b31f49a74a30c203775de0ed07cca176e8c2ac818c9eae5f77e369512da72ca5ad438c1dbc1dc5cc871ba438f158e6161d592cf48a5c640d8d0584f488df418d41b18fb83d3142db8d2a1855393a3ca173f786becbff83efa0ac4ddf30aef943e026f6ed6d9eae546ad71ee4625460cccd87b87fd7198b7ece88fd7bcd528471414866a57345de6541e9f97c5149af46f8a4deb84a40543ff204f8c5b9f401600348004fdd02bb8202f2b56271cf1e9c6195f47311438de068fee7023e6a9d4a4c0e4427e6a49ae404c8a7c378840f18ef865b09303959e78247b31c6b435ef528d92fb96eae3df27c6c0e29948cbd42f98dc2fb5f7055382eb8496a1c1fa125eed8526b56c609c2056a8bda9e162c0371ed25111e09e3825ce23a834fa1ed2333796a2e7a58ea3534aabd4a94c918d8e586b19bc85405c9ddb511f61ed45461831315862a6a8edc34909932ba255aafcee7434eebfd18ef0e88d275a9f9405cdbd95861ae1fd947105de7be28300e8e69e8a97096f6002c193c91858614ce89ac6b7a850a3623e9a23be716f2197dc86ce0441d146ef2d0ed865351b621577e6374386de7932f428fadd2794ad15296f62c1863aba8817b1c707ccb4f758b3e7e7c9d13edf3b04f5d3dbe1156b0a39f6953b6f40547923637cd544c569ae0da96103ac5ac628e82fb8f93fe54ad731525ae26343d252fa021efad678519127be4841b8ccc5a1e9a83b7e6f823fd7b66c87f25d00a61d2eb07e00c51df4fb26b86e9c744a9ba9c368f29d8953403ac46bf49825790933a084b4ac2812003a0a757c3ad5f5c177755f1963848fb8f89cfaeaf51ff73044eff30158806fc83f60dbf188e8d8fae00803cef75ea425b70391f885ae4f05c7f512a79bf056544d5abc1f606558e5cc29747bd7592de6c3adbd2d95ff4e16e33b0ef27207ff63396cf79fc98815e573a8ffb05db9c8be2d2db65fa22f46d7b82cfeecd7d1318342542bdfd09760259fcec523b64df2fb04248b636ec743d79627ed85aa98b63db21f4d7d0092a49d3bcd4202149b59605d1d97f64d8850600928087e4554de2561d766d35edf336e8a732a2e7421f3693a58401d8f72cd05a4a77997aca2562c137b7751ca71c849545e7a3afb374e5de5891f1e1f2f77df3a22e8e423633d892f8d52fdf02f0f5ce85b6745974570ddd46aa351abefccfb15fa61e4af054689cb57898011ab8b58cd64459cbe0262d188777fae429ac9763306d727772b58c2f8eb3a289a6d53dda81a40be7b453ce7e2dcb327381cea98416905c59b3946732ddbdeee86f8a5f604a78418859eaa550d365a6bd4b848e67364908dd8b8595cc4fbea4ce6bc11446b2932dc68ba54316b29f2b577d907c02861628e3c0eaf3ee39eea430bbe6aa516314aacf71ab94e1a39ed51bed1d994ca49a6a8372ffd6fd74454db7d2c0283543122e6a5d902f44ed13927599999bb853c3b31fb29194b1c223f0aefce52080a9a7a5478c10e60650a11b2c00ac5416db8db507fc0a1fc6a8fea23ca79f6a0c86adbe12409ae14ba82e7346134016256eb79611c0f96020493b2e40a78b56de4be35df5332441d4037df7bdd1151a9867ee34561dbf65df841e61b228c36733a9cf874b0cb6c938764e0d34d1376877d2dcfece78e4577f25758edfc2ede620ea183684a2af13f0f28c6d40e7e29eae5f8a8dc99f466eab6e927e353adb228ee773387eb7cde115f55f370fa35c2d8397ed1cdcdbe0ea28c2748521bcfbfd3ea9cdd39e869f572eca1cc804259d44ee12523bdb4f77ef3ba11d8b7dad4b74c3ccafa036100ee2b9c8ea4f70bc303bab0531efab8d75d45487ab009bebabe388a4b5ff17fed241e70a886aed133a5e930f81f25ed2fffc07fb287114564a8000fafbbefebd821ff19028637ab1bd9ffc9d1e82036032f0fec2055461394a28bd58119ee830f79d15b45b14257d87e59155d55e182a95e5799b788aaeca55ba60701b8de7daf38dce6175f064b9a6c719523801cd8ed549c20d961d1035d6f5fe3e5736732586b1ae295a904ddc829f45c6f85326d91b3bc9799a8d78099d6f64e2a9466dffbc6ee6235976a7d1c24e52ec69eaab3433fd6fd9a7d8dde4e126af3793c4d120aa5f17e404f806f0668013def6278722edd224ecb905278e84fd9f5653da95b5e4c8b29147cad6f22ba2ab1cc58d2bcbb5cb22687db8ab31c076ee4e23086b40d09c96e3a2f27e3c57ae69aedd99b002f2c08bc5aec926d3bd9bc1a7ba41740a77d19f96c0446e31ef8734ab557f31fe948f9436edd0363ad9e2d31ebb88efa38f77ee02548afdfac5028c710b214189d5b96f49a4fa110a9e088f390b2cea3900ac461aa6a49b4b2e6c95ee251389f1faba36bd13a2a7f413b34db7004a52586020f1e070dc20505c0c64a5d468f77c95a70ae9479b47c92360eb2924fd965b2aef4f4761485e9d1435c743270f541d559bf2f4851b9f7b38f5e81273a4e7620d7c63add6ecba154d59097c36624db57819848d72e4cae4e6877a2c058ada2646eed4a159f9ed0a2d235d19e42d69dc148027551f8cf5a214aa9a2e454434e9acdbc081af7d5bf76f541edb5affd44c3af96f0b68d4bf7a29965837727c205f5a218aa89db2eec428abae13e38590ebe9a372ad223de1a9a6b343e45b9b9f30d15e487e865e9c767674f814fe67065577d3ff8912f06699de5db73270232023dbbcb3e7a4920d4b693118013b6a0fda3518977e8bcafae5db3f57819d23c11c01ec5a5f109e64559410406c4913aa85496ee30744e2057a8919647644bca9ff09ab5b55fd7d18cfbec4c6c0874d283c30948ab7d20012a45784a5e2d10eea57ab23fd78f4e9d54632525810243133ccbbcf79f9cae722910b4b9750b2a987c4772632df2db0b15d742c5e627f3c63e56200586f2ed2038a698215f650421d264b0aa380cbc75ec7e077970408e08878e71ca5785a7d523d2e0e8bb2903c107eab42ed64037fc515fa3d754e5ef9af0e317f1e33bdb54173c1b801f1ee793b75a4ac44ca7809201d5c51c019617757450bf3b6c63721906ced64c31b1d69a7d6f20eb7a28b813cce4847fc94dc302612e4678262a0db65cad72ad8c252af6487abd4af67b2fa0cea6d0feabcf0df12659b9613483f56d93e48773f0be528b739fd2771478232ecda8d059a7fa796467fa868f500500e77a6d84e0dd1fd617628d876af215c6d5b3100ed72daf65af0d501d1d1111b9cedf8f98009586a769993edadbffad5fb477e9d7fe16bc9ba161d6b821f8a7a6589d4be6f55736015878ed4b157c9b77d6f27b030c54d05b46f72b23dff389c6b3297cdd89a1aa8e05295e54aba8c551482af96278ac214ede198982fc05048ce54abad64698ac9392fe5fd0620683daabf6ea71ec1e62f58555005dbf164477dab44b7f670156d96610420cc85564383290fb10c301e1ae1a5d2d0511a20773b0b5654907f6f00fc9f70346f0010159f9f8e66853ebc57e39b5e2b2e81d1a5a4a3b3adb0e43648900fe3b3e41499a6cbcd4fb3308c3d62fb8e3f0decb08437f8cccb2844480a92c7ba122c5c50a9925d59e0d7e05f393bfd4bbb317ff53afc57432670686f100ec77702b16c30f1af7fe2720949fc426c14fbe302d0a4f4dcdb65c08801f6362863a91fc8c6d80cf783353899852fdcb08841c8135f6929d9ca21b6ac6613a64be00c1a96bfa6f42271a174ea25f8ce4bdcbd0e555f44857387b59deb2d883d6baca268cecb0eee10fa2bd8d80bd6e8b72d1e91f645654f3a312528e0cd0512383c8ea05aa95cbd2ba6359bcc5efa88f5f60f4810c634efd3a5c0470e4cbed05a2b605115cdc52d904c50f593d9dede68b00ac0ff42a2cdc55713513678872d3593693ffa7ff8f9dad5c200157dda45adafe50be77aba4bcb4738bab4764b99970ad2704db58f3c1564b7050324d9244ac8ea9e79bebf01750818311bb0b2a1e8a074f78fe0e7b824f941b0265b156fef112d1298d4a4604888be2af94845d17b234ef91a74183727b9b5f2c612719dcc6ed34188cdd7381b7f3a0d7697571d4e36a12a4ec280c587250b32a41f411a014cb51dec67c0c281106aab04f37e6344d570aaac154a1a70baf6430ddc9941f781ba1deade5579539adeda382d8f36fe4eabe3435e1f1ccc9958e569b60a1ac6a7af40de59e1f9285e3e03746669a379488bf492db5299f46645667e990ed3be4bc3f880e62e0dfbe4f80e69fd54a80788a5f7c71faad06884c5ba6ff85ea6858ae36f1bebd43077862a89f6958347ec1ea405d87cd0fddee446e9b6e494568b3ceda2d167e6067710cb1b957283ea20da492f0d79ced4a104868eb65a7d0a9583fea01611c28d5cd8bcef711a815dffef04e0f6bd7e5b3c15d8615b7575b8ccf9525ce5caf8502fe484de371e2d046576710fadd9677985655001fdc5d0831a89e1e29a33fd8d1cda5b7b9b033f5fd1784f767a2d697042639273e4f145ea7830c8737b510a26f5e67b7e550402b1b5909182d4c2eb5d0c88d3785f67fa3fbf4016cf42ac77e8e", @generic="3d7d3d09e3de43026401ac5af5b97fee625a992b751aff72a6be4e7ad6455b0b2ba8222b576e7bb1e1708f67a28685e27d8f3a13fc9b09cdc2b6178ce62b37203dad5c972ff932efd382749a271db11c172e6239612ca9734d3f838a6c1aab0d5f1f317a6adea0f9a17c2a400f566aa2ded4b6ccb23d2e7c78f11bd4f5debf1571855d3ae09b69721730a6c9d179717d538be64b60ab3508069a740944", @typed={0x5d, 0x0, 0x0, 0x0, @binary="4ee81eb9df37096857642d8166ee57450fc9a3bab3861b037942bb465ccf73d77a29dfeb3f9101f1bad632ed8c26d4b603efde4eafc5ba0f9399274c08cd7a71f0cb39f79a01275071dc4d6f987f3104267dd4014eabe5ceae"}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @nested={0x1c9, 0x0, 0x0, 0x1, [@generic="7c0699af0c0f2f69df1d17117fd020d2d48cdfc3a6e8f61190927d9e6f205ed8977d46a71096dfa5c593b7e7a73176c818fe13e725509a80a61d15e24b0964d429487d1c9efe9902ea7411ae905a9ee4549732a55d41ee9aea4816b3ad6706c4a1c5885403362581c90a028f16ed5c555d40d3d815ddfe4f45f83238da8cf57e0934c5da1eab3693caec82de95e87717c0d9a49a1425b07f87b8e2e8ff29f0a870a6342166f22648d218bf1082c4cc63fbb0d4d324f9793a60f4", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="121e39fca60141f9deff3a826658a206fbddb074591988ff3b825705c3c48941fe0499fc26852f4997f508ed9697dbc0753fc78d5e2266acc07419a42b74959b9718248aa53744c43f0c4f7b7fc9642061fdefe5e9dcd43424c7605b0ad6f516de7c9371471305c1a62454019de8fde94c8d78ac3e0b8559ef61edc9b115cea0361f814be28ab33c0f0f4c8fb0f199990c4bfc9c3cee8979ebdedbc99290ae0b", @generic="17eafec70aec701a23dd6a7e64aefeca71168cf76488df43630556481b06679d137a466b6c0b5e13267593e950d265a9f75d794c2f19d6ece5644fee8035b7394aeed5ed0d2ac115d3056d5237a3de258fc012b6fb6af436267d3f", @typed={0x8, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}]}, @generic="b77d16720f59d1fdfb5aeaa7848719f182f00232c4881aef8043b1567bec68ce0d40e6a85bf5a3f6e4b0f94f6af7eeb7ddc85cead0a3b6f97ac7afd6ff366e2604b1313812bfccb3437681bfd0023f3c44bd384592b2db19dd4e3af24812fc0bbc624cd9f7e74eb176f4172f2a7fa736031801b3abcafe6e9f877a50c5c611f5b6d687117eafb59a2fa141c75e679cb6f9296ba7a62773a173695e7e149c185a09636ada66502dc9cd033603b3192d4383912381c5eac9f92dd4f5594fbe", @generic="d8f86fa63b7daff23cc59ac64465b6ee7ea41020b450", @generic="a106d53cdf1854c4f52b7f3041d76ad880122a8c152fe7dff1"]}, 0x14e4}, {&(0x7f0000001600)={0x9e0, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xd5, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x6, 0x0, 0x0, 0x0, @str='}\x00'}, @generic="36918aaf24ffa8bf68f0d76ad9a5adbeb8216803faf18cea2468230f9e5e35708aeb7f443646ae51c7d26e2a8a526b30be91df0de2f2cb42c5a1cd5ab4bd55c6e1ba09e42cf15957f21f1cf94edd988d9fd6c71e470007307ba085503c4aa656a4721511acf03b990498b37d2e832b3290a4d206cc2ff5f6f2b8fe82d21aa5021fa1c6bcd7d644614afa217b23d21f6f64321fc87afc43863aac6982ff6607f423b1efb0d425b613eb2eb0140c3fd9a9743b80656a8a2614698371beef4b8453f4"]}, @nested={0x8e9, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private}, @generic="7d73d22fad8db22a83f86d847044d9290dd383588046129f6666f24ff3959ec0afede57ccc02879888c65d4951810bf2d55624acd0bfe4abc04e08b35b184cb3f441f7e1121f00d7fb48061440e4f90be51dad8835f972dcbc8a7df08b45238464b29c4404dd1218ec02e779bcd3e733", @generic="69ef2ad85c9ab68f75ee873e125f3031b023d689683efe5221a2e0b59826410060158e6953b594aae2453e02a80df7535d8f6ff8ac3dc24b2993433a26365458fd63552ade8dad86c092fcedccb100f7a067efed1422e7cddeecaa1d85ca7e06d107eec7ed04af7fe4f1eb72a12f24ed58ce395f3c945ba4084420122a6840ce8e16bcba7e5797c5adbc3ad3003e32a2975d9932293f86340a0ff80b94d1d23b5b", @typed={0x7c9, 0x0, 0x0, 0x0, @binary="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"}]}]}, 0x9e0}], 0x2}, 0x0) [ 303.230447][T15716] loop5: detected capacity change from 0 to 264192 [ 303.243475][T15718] loop3: detected capacity change from 0 to 8 19:13:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) dup3(r0, r1, 0x0) [ 303.330885][T15716] FAT-fs (loop5): invalid media value (0x00) [ 303.355484][T15718] unable to read xattr id index table 19:13:23 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, 0x0}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 303.376162][T15716] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:23 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740e", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 303.441861][ T37] kauditd_printk_skb: 4 callbacks suppressed [ 303.441874][ T37] audit: type=1804 audit(1627154003.214:98): pid=15731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir932285772/syzkaller.TbCXaO/243/bus" dev="sda1" ino=14987 res=1 errno=0 19:13:23 executing program 2: setuid(0xee01) openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x300, 0x0) 19:13:23 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e5}], 0x0, &(0x7f0000010300)) [ 303.596873][ T37] audit: type=1804 audit(1627154003.264:99): pid=15734 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir932285772/syzkaller.TbCXaO/243/bus" dev="sda1" ino=14987 res=1 errno=0 [ 303.605224][T15741] loop3: detected capacity change from 0 to 8 [ 303.681496][T15745] loop5: detected capacity change from 0 to 264192 [ 303.748706][T15745] FAT-fs (loop5): invalid media value (0x00) [ 303.750216][T15741] unable to read xattr id index table [ 303.774058][T15745] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0x0) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x227c, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:13:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)={[{@fat=@dos1xfloppy}]}) 19:13:23 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, 0x0}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:23 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e5}], 0x0, &(0x7f0000010300)) 19:13:23 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740e", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 304.199328][T15762] loop3: detected capacity change from 0 to 8 19:13:24 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)=0x0) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/144, 0x90}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 304.253348][T15768] loop5: detected capacity change from 0 to 264192 19:13:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0xf, 0xffffffffffffffff, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 304.297454][T15762] unable to read xattr id index table [ 304.326706][T15768] FAT-fs (loop5): invalid media value (0x00) 19:13:24 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 304.377444][T15768] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:24 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e5}], 0x0, &(0x7f0000010300)) 19:13:24 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:24 executing program 0: socketpair(0x10, 0x2, 0x0, &(0x7f0000001600)) [ 304.543390][T15786] loop3: detected capacity change from 0 to 8 [ 304.577309][T15786] unable to read xattr id index table [ 304.598166][T15790] loop5: detected capacity change from 0 to 264192 [ 304.611958][T15790] FAT-fs (loop5): bogus number of FAT sectors [ 304.621132][T15790] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0x0) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:24 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:24 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a10200000000000001", 0x2e6}], 0x0, 0x0) 19:13:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, 0x0, &(0x7f0000000280)) 19:13:24 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:25 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653fd0531f453e02498fbde0700ae8904a4000026b073639a1e954d5ab555b1dd249c54f2b004e3dcdd1ff467e4d32711921cc5e41e4a2133d1c3daef7906b9eb4c29c07a5ff5a326e865f6fb27971296f3b66db4f4f5e7919112bb21ed844fc3f7303bd28fd81d02acf4994b373340e7e151f7427d02cca0aaa71eeed9a1ddae2e2b209686c4c5bc2831155c2b94186fff232f51c529b6d3a470fdb290026a41c84e061802f8846f005c188914cab9b79f0f7979b62f6a80060e59d23e75c94fdeec75cc893e38b715d4b084469440a534efde", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() tkill(r2, 0x1e) [ 305.180257][T15804] loop3: detected capacity change from 0 to 8 [ 305.206237][T15807] loop5: detected capacity change from 0 to 264192 [ 305.250329][T15807] FAT-fs (loop5): bogus number of FAT sectors [ 305.260698][T15807] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:25 executing program 2: modify_ldt$write(0x1, &(0x7f0000000040)={0xffe00}, 0x10) 19:13:25 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:25 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, 0x0) [ 305.317529][T15817] ptrace attach of "/root/syz-executor.0"[15816] was attempted by "/root/syz-executor.0"[15817] 19:13:25 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653fd0531f453e02498fbde0700ae8904a4000026b073639a1e954d5ab555b1dd249c54f2b004e3dcdd1ff467e4d32711921cc5e41e4a2133d1c3daef7906b9eb4c29c07a5ff5a326e865f6fb27971296f3b66db4f4f5e7919112bb21ed844fc3f7303bd28fd81d02acf4994b373340e7e151f7427d02cca0aaa71eeed9a1ddae2e2b209686c4c5bc2831155c2b94186fff232f51c529b6d3a470fdb290026a41c84e061802f8846f005c188914cab9b79f0f7979b62f6a80060e59d23e75c94fdeec75cc893e38b715d4b084469440a534efdeaaeffa836e449c4a53b2ed5c3c1bf2b2ab14763f118df0ca3abfe046", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 19:13:25 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:25 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x40305829, 0x0) [ 305.477832][T15830] loop3: detected capacity change from 0 to 8 [ 305.487247][T15832] ptrace attach of "/root/syz-executor.0"[15829] was attempted by "/root/syz-executor.0"[15832] [ 305.504342][T15833] loop5: detected capacity change from 0 to 264192 [ 305.550119][T15833] FAT-fs (loop5): bogus number of FAT sectors [ 305.572562][T15833] FAT-fs (loop5): Can't find a valid FAT filesystem 19:13:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0x0) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 19:13:25 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:25 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)='syz') 19:13:25 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x5451, 0x0) 19:13:25 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, 0x0) 19:13:25 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:25 executing program 0: keyctl$get_persistent(0x4, 0x0, 0x0) [ 306.130175][T15852] loop5: detected capacity change from 0 to 264192 [ 306.144737][T15853] loop3: detected capacity change from 0 to 8 19:13:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000034c0)={&(0x7f0000000040)=@kern={0x2}, 0xc, 0x0}, 0x0) 19:13:26 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:26 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:26 executing program 0: keyctl$get_persistent(0x4, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000940)={0x54, 0x14, 0x1, 0x0, 0x0, "", [@nested={0x20, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}]}, @typed={0xd, 0x0, 0x0, 0x0, @str='@-#-}&@!\x00'}, @generic="2ebe82671a512be9652d1edeed01156de0"]}, 0x54}], 0x1}, 0x0) 19:13:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) [ 306.496521][T15876] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 306.545043][T15877] loop5: detected capacity change from 0 to 264192 19:13:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(0x0, 0x0, 0x0) 19:13:26 executing program 2: syz_emit_ethernet(0x8e, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x19, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @broadcast, {[@generic={0x0, 0x2}, @ra={0x94, 0x4}, @cipso={0x86, 0x48, 0x0, [{0x0, 0xe, "5c474bcffb609abd15e63d4c"}, {0x0, 0x11, "8167f921a4401bf7c05dc73fb7ad3a"}, {0x0, 0xb, "4d1ac4fd21ef0cd9d4"}, {0x0, 0x7, "23de5d92a9"}, {0x0, 0x11, "f124b19ea163f5c9ef22308d8f9f96"}]}]}}}}}}}, 0x0) 19:13:26 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:26 executing program 0: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x11, 0xffffffffffffffff, 0x0) 19:13:26 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:26 executing program 2: clock_gettime(0xb, 0x0) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000000)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0xfffffffffffffffd, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) [ 307.089625][T15891] loop5: detected capacity change from 0 to 264192 19:13:26 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$unlink(0x9, r1, r2) 19:13:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:26 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, 0x0, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:27 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 307.291636][T15901] can: request_module (can-proto-0) failed. [ 307.303921][T15901] can: request_module (can-proto-0) failed. 19:13:27 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe0, 0x13, 0x1, 0x0, 0x0, {{'morus640-sse2\x00'}}}, 0xe0}}, 0x0) recvmmsg(r0, &(0x7f00000061c0)=[{{0x0, 0x0, &(0x7f00000060c0)=[{&(0x7f0000005fc0)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) [ 307.490708][T15919] loop5: detected capacity change from 0 to 264192 19:13:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:27 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, 0x0, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:27 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 19:13:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(0x0, 0x0, 0x0) 19:13:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 19:13:27 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 308.031255][T15932] loop5: detected capacity change from 0 to 264192 19:13:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:27 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, 0x0, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:27 executing program 2: fanotify_init(0x4bc7c75bf69587e9, 0x0) 19:13:27 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$get_persistent(0xf, 0xffffffffffffffff, r1) 19:13:28 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @multicast2}, @sco={0x1f, @none}, @tipc, 0x7e6e}) 19:13:28 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140), 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:28 executing program 2: prlimit64(0x0, 0x4, &(0x7f0000000080)={0x0, 0xffffffff}, 0x0) [ 308.459647][T15960] loop5: detected capacity change from 0 to 264192 19:13:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x64, 0x4000000000008d}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa7000be2) open(0x0, 0x0, 0x0) 19:13:28 executing program 0: socketpair(0x1d, 0x0, 0x65e, &(0x7f0000000180)) 19:13:28 executing program 2: keyctl$get_persistent(0x18, 0xffffffffffffffff, 0x0) 19:13:28 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140), 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:28 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(0x0, 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 308.947833][T15977] loop5: detected capacity change from 0 to 264192 19:13:28 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140), 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:28 executing program 0: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x20000000, &(0x7f0000000380), 0x0, &(0x7f00000003c0)={[{@fat=@dos1xfloppy}, {@fat=@codepage={'codepage', 0x3d, '861'}}]}) 19:13:28 executing program 2: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 19:13:28 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(0x0, 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) [ 309.311908][T15996] loop5: detected capacity change from 0 to 264192 19:13:29 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(0x0, 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:29 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x207de) 19:13:29 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:29 executing program 2: migrate_pages(0x0, 0x6, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0xffffffffffffff81) 19:13:29 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) [ 309.953188][T16015] loop5: detected capacity change from 0 to 264192 19:13:29 executing program 2: keyctl$get_persistent(0x1e, 0xffffffffffffffff, 0x0) 19:13:29 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:29 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:29 executing program 0: syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x1937c2) 19:13:29 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x6, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x12eb, 0x0) 19:13:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000000)="422c0148861cac299a6f48ff", 0xc, 0x5}, {&(0x7f0000000400)="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", 0x148, 0xb8}], 0x0, &(0x7f00000003c0)) 19:13:30 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x0, 0x40}) 19:13:30 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:30 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) [ 310.330976][T16037] loop5: detected capacity change from 0 to 264192 19:13:30 executing program 2: r0 = socket(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8981, 0x0) 19:13:30 executing program 1: syz_open_procfs$namespace(0x0, 0x0) r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x0) 19:13:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, 0x0) 19:13:30 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:30 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:30 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653fd0531f453e02498fbde0700ae8904a4000026b073639a1e954d5ab555b1dd249c54f2b004e3dcdd1ff467e4d32711921cc5e41e4a2133d1c3daef7906b9eb4c29c07a5ff5a326e865f6fb27971296f3b66db4f4f5e7919112bb21ed844fc3f7303bd28fd81d02acf4994b373340e7e151f7427d02cca0aaa71eeed9a1ddae2e2b209686c4c5bc2831155c2b94186fff232f51c529b6d3a470fdb290026a41c84e061802f8846f005c188914cab9b79f0f7979b62f6a80060e59d23e75c94fdeec75cc893e38b715d4b084469440a534efdeaaeffa836e449c4a53b2ed5c3c1bf2b2ab14763f118df0ca3abfe046d64e33aeb08690ac2aa05529459d", 0xfe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() tkill(r2, 0x1e) [ 310.527351][T16052] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 19:13:30 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b52, &(0x7f0000000080)) 19:13:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, 0x0) 19:13:30 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe0, 0x13, 0x0, 0x0, 0x0, {{'morus640-sse2\x00'}}}, 0xe0}, 0x300}, 0x0) [ 310.688360][T16064] loop5: detected capacity change from 0 to 264192 [ 310.692061][T16063] ptrace attach of "/root/syz-executor.2"[16061] was attempted by "/root/syz-executor.2"[16063] 19:13:30 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:30 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:30 executing program 0: keyctl$get_persistent(0x4, 0xffffffffffffffff, 0x0) setgid(0xee00) [ 310.992526][T16083] loop5: detected capacity change from 0 to 264192 19:13:31 executing program 1: r0 = socket(0x26, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) 19:13:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, 0x0) 19:13:31 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$unlink(0x9, r2, r0) 19:13:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000bc0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000005c0), r0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), r0) 19:13:31 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, 0x0, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:31 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)) [ 311.607368][T16105] loop5: detected capacity change from 0 to 264192 19:13:31 executing program 2: syz_genetlink_get_family_id$nl802154(0xfffffffffffffffd, 0xffffffffffffffff) 19:13:31 executing program 0: keyctl$get_persistent(0x1c, 0xffffffffffffffff, 0x0) 19:13:31 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, 0x0, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:31 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x5, 0x8c982) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x4081002, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x0, 0x0, 0x100007e00) 19:13:31 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)) 19:13:31 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0xa00, 0x0) 19:13:31 executing program 2: socketpair(0x2, 0x1, 0x7, &(0x7f0000001080)) 19:13:31 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, 0x0, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:31 executing program 1: pipe2(&(0x7f0000000e40), 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, &(0x7f0000000280), 0x0) 19:13:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000080)) 19:13:31 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) [ 312.079678][T16137] loop5: detected capacity change from 0 to 264192 19:13:31 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:31 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:31 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653fd0531f453e02498fbde0700ae8904a4000026b073639a1e954d5ab555b1dd249c54f2b004e3dcdd1ff467e4d32711921cc5e41e4a2133d1c3daef7906b9eb4c29c07a5ff5a326e865f6fb27971296f3b66db4f4f5e7919112bb21ed844fc3f7303bd28fd81d02acf4994b373340e7e151f7427d02cca0aaa71eeed9a1ddae2e2b209686c4c5bc2831155c2b94186fff232f51c529b6d3a470fdb290026a41c84e061802f8846f005c188914cab9b79f0f7979b62f6a80060e59d23e75c94fdeec75cc893e38b715d4b084469440a534efdeaaeffa836e449c4a53b2ed5c3c1bf2", 0xe3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() tkill(r2, 0x1e) 19:13:32 executing program 1: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x2000000) 19:13:32 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) 19:13:32 executing program 3: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x7e, &(0x7f0000000000)=ANY=[], 0x0) syz_emit_ethernet(0x14, &(0x7f0000000080)={@dev, @broadcast, @val={@void}, {@generic={0x0, "17be"}}}, 0x0) 19:13:32 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x15}, 0x0) 19:13:32 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 312.315778][T16153] ptrace attach of "/root/syz-executor.3"[16151] was attempted by "/root/syz-executor.3"[16153] 19:13:32 executing program 1: keyctl$get_persistent(0x8, 0xffffffffffffffff, 0x0) [ 312.436122][T16157] loop5: detected capacity change from 0 to 264192 19:13:32 executing program 2: r0 = socket(0x26, 0x5, 0x0) bind$unix(r0, 0x0, 0x18) 19:13:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b4b, &(0x7f0000000080)) 19:13:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x227f, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:13:32 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:32 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 19:13:32 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:32 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x10b47e, 0x0) acct(&(0x7f0000000080)='./bus/file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x4b0c03, 0x19c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) tkill(0x0, 0xf) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x2000000000010, 0x3, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./bus\x00') syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r1) write(r1, &(0x7f0000000040)="240000001a0025f00034009300edfc0e800300000000af00000000000800020048050052", 0x24) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 19:13:32 executing program 3: r0 = socket(0x2, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 19:13:32 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @local, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @rand_addr=0x64010101, {[@timestamp={0x44, 0x8, 0x5, 0xf, 0x0, [0x0]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 19:13:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x0, @l2tp={0x2, 0x0, @empty}, @isdn, @isdn, 0x3f}) 19:13:32 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 312.801386][T16190] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 312.834904][ T37] audit: type=1800 audit(1627154012.604:100): pid=16190 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=2 res=0 errno=0 19:13:32 executing program 3: syz_emit_ethernet(0x3a, &(0x7f0000000800)={@link_local, @multicast, @void, {@ipv4={0x800, @dccp={{0x7, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr, @multicast1, {[@rr={0x7, 0x7, 0x4, [@initdev={0xac, 0x1e, 0x0, 0x0}]}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d765f8", 0x0, "9c99a9"}}}}}}, 0x0) 19:13:32 executing program 1: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x100000003, 0x0, 0x80019c) socket$unix(0x1, 0x0, 0x0) [ 312.878350][T16195] loop5: detected capacity change from 0 to 264192 19:13:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 19:13:32 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe8, 0x13, 0x1, 0x0, 0x0, {{'morus640-sse2\x00'}}, [{0x3}]}, 0xe8}}, 0x0) 19:13:32 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:32 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:32 executing program 3: request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='cifs.spnego\x00', 0x0) 19:13:32 executing program 0: syz_open_dev$rtc(&(0x7f0000000000), 0x6, 0x185582) 19:13:32 executing program 1: sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x0, 0x0, 0x0, 0xdf23}, 0x0) 19:13:33 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x3) 19:13:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf803, &(0x7f00000003c0)) 19:13:33 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x3, 0xffffffffffffffff, 0x0) [ 313.301586][T16223] loop5: detected capacity change from 0 to 264192 19:13:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000011c0), 0x0, &(0x7f0000001200)={[{@fat=@sys_immutable}]}) 19:13:33 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, 0x0}, 0x10001) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:33 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x0, 0x40c00) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={0x0}) 19:13:33 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:33 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000000)=ANY=[], 0x0) 19:13:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x3, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x800}], 0x81, &(0x7f0000000180)) [ 313.548851][T16233] FAT-fs (loop3): bogus number of reserved sectors [ 313.561508][T16233] FAT-fs (loop3): Can't find a valid FAT filesystem 19:13:33 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x0) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:33 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000140)) splice(r0, &(0x7f00000000c0)=0x5, r1, &(0x7f0000000100)=0x40, 0x5, 0xc) 19:13:33 executing program 3: keyctl$get_persistent(0x4, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x1) 19:13:33 executing program 0: syz_open_dev$usbmon(&(0x7f0000000d40), 0x7, 0x2040) 19:13:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000002580)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000002340)="7e4b4ebcec270581182898051b50446bbb27ddac0bc75c2b5b7f7868a74f086be4", &(0x7f0000002440)=""/223, 0x0, 0x0, 0x0, 0x0}) [ 313.738244][T16250] loop5: detected capacity change from 0 to 264192 19:13:33 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(0x0, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:33 executing program 2: keyctl$get_persistent(0x6, 0xffffffffffffffff, 0x0) 19:13:33 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x2, 0x400000) [ 313.890744][ C1] sd 0:0:1:0: [sg0] tag#5192 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 313.901214][ C1] sd 0:0:1:0: [sg0] tag#5192 CDB: Extended CDB [ 313.907456][ C1] sd 0:0:1:0: [sg0] tag#5192 CDB[00]: 7e 4b 4e bc ec 27 05 81 18 28 98 05 1b 50 44 6b [ 313.917161][ C1] sd 0:0:1:0: [sg0] tag#5192 CDB[10]: bb 27 dd ac 0b c7 5c 2b 5b 7f 78 68 a7 4f 08 6b [ 313.926867][ C1] sd 0:0:1:0: [sg0] tag#5192 CDB[20]: e4 19:13:33 executing program 0: pipe2(&(0x7f0000000e40), 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, 0x0, 0x0) [ 313.955588][ C1] sd 0:0:1:0: [sg0] tag#5193 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 313.966300][ C1] sd 0:0:1:0: [sg0] tag#5193 CDB: Extended CDB [ 313.972468][ C1] sd 0:0:1:0: [sg0] tag#5193 CDB[00]: 7e 4b 4e bc ec 27 05 81 18 28 98 05 1b 50 44 6b [ 313.982268][ C1] sd 0:0:1:0: [sg0] tag#5193 CDB[10]: bb 27 dd ac 0b c7 5c 2b 5b 7f 78 68 a7 4f 08 6b [ 313.991906][ C1] sd 0:0:1:0: [sg0] tag#5193 CDB[20]: e4 19:13:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000002580)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000002340)="7e4b4ebcec270581182898051b50446bbb27ddac0bc75c2b5b7f7868a74f086be4", &(0x7f0000002440)=""/223, 0x0, 0x0, 0x0, 0x0}) 19:13:33 executing program 2: syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000002540)=[{&(0x7f0000001240)="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", 0x1000}], 0x0, 0x0) 19:13:33 executing program 3: mmap$usbmon(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 314.141361][ C1] sd 0:0:1:0: [sg0] tag#5194 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 314.152018][ C1] sd 0:0:1:0: [sg0] tag#5194 CDB: Extended CDB [ 314.158253][ C1] sd 0:0:1:0: [sg0] tag#5194 CDB[00]: 7e 4b 4e bc ec 27 05 81 18 28 98 05 1b 50 44 6b [ 314.167921][ C1] sd 0:0:1:0: [sg0] tag#5194 CDB[10]: bb 27 dd ac 0b c7 5c 2b 5b 7f 78 68 a7 4f 08 6b [ 314.177500][ C1] sd 0:0:1:0: [sg0] tag#5194 CDB[20]: e4 19:13:34 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x0) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:34 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0xf, 0xffffffffffffffff, 0x0) 19:13:34 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=""/231, 0xe7}}], 0x1, 0x0, &(0x7f0000001300)={0x77359400}) sendmsg$nl_crypto(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) 19:13:34 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x200000000002f2) [ 314.317059][T16279] loop5: detected capacity change from 0 to 264192 19:13:34 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe0, 0x13, 0x0, 0x0, 0x0, {{'morus640-sse2\x00'}}}, 0xe0}, 0x15}, 0x0) 19:13:34 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(0x0, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b2f, 0x0) 19:13:34 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@multicast, @empty, @void, {@ipv4={0x300, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @echo_reply={0x1c}}}}}, 0x0) [ 314.530559][T16293] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 314.597849][T16293] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 314.689742][T16300] loop5: detected capacity change from 0 to 264192 19:13:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000034c0)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003440)=[{&(0x7f0000003500)={0xec4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xeb1, 0x0, 0x0, 0x1, [@generic="5f5ab0afc45a02d7e1d6eb2f99ce879648cab0771665aa7cb5cadaf4ae3215261d91cf85b9a1842bf2161643bab2623e0709c79d063c26d676a90ca40373d047affeed0856fd4f3e923def938eb194ebb108d2ec440b8bebbe5b722e41f3f1fff8c4f698dcac61ff0252d5459ec197a8fdfce569959cd4adbb9766b68d287beb3a8c5b2716f0bb2d4346fefedea33a7f84a570d43afbebe89241cac4c4fb2ce56355d0254df6517311205db2ae4913ac134f5bde4ffcca097e7d9a499889fb92ae8898bcfa9855e53f7cd0858628e9c193719427c1bef5882ae9870fc5c3e61c583006f142b0a8e3cb8434b7", @generic="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"]}]}, 0xec4}], 0x1}, 0x0) 19:13:34 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() tkill(r2, 0x1e) 19:13:34 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=""/231, 0xe7}}], 0x1, 0x0, &(0x7f0000001300)={0x77359400}) sendmsg$nl_crypto(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) 19:13:34 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) 19:13:34 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x0) io_uring_enter(r0, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:34 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(0x0, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 315.160771][T16317] loop5: detected capacity change from 0 to 264192 [ 315.187355][T16318] ptrace attach of "/root/syz-executor.1"[16316] was attempted by "/root/syz-executor.1"[16318] 19:13:35 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') setns(r0, 0x20000) 19:13:35 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 315.206294][T16320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 19:13:35 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) 19:13:35 executing program 1: r0 = socket(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8982, 0x0) 19:13:35 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r1, r1, 0x0) [ 315.393099][T16327] loop5: detected capacity change from 0 to 264192 19:13:35 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000040)={@multicast, @empty, @void, {@ipv4={0x800, @icmp={{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3, 0x3d}, @lsrr={0x83, 0x3, 0x2f}]}}}}}}, 0x0) 19:13:35 executing program 1: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000003c0)) 19:13:35 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:35 executing program 4: syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r2, r1, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r0, r1, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(0xffffffffffffffff, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 315.735291][T16346] loop5: detected capacity change from 0 to 264192 19:13:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000380), &(0x7f00000003c0)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)) 19:13:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, r1) 19:13:35 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) 19:13:35 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:35 executing program 4: syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r2, r1, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r0, r1, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(0xffffffffffffffff, 0x445f5, 0x0, 0x0, 0x0, 0x0) [ 316.131447][T16364] loop5: detected capacity change from 0 to 264192 19:13:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0xa0260000, &(0x7f0000000380), 0x0, &(0x7f00000003c0)={[{@fat=@dos1xfloppy}, {@fat=@codepage={'codepage', 0x3d, '861'}}]}) 19:13:36 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:36 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) 19:13:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1010000, &(0x7f0000000e40)) 19:13:36 executing program 4: syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r2, r1, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r0, r1, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x10001) io_uring_enter(0xffffffffffffffff, 0x445f5, 0x0, 0x0, 0x0, 0x0) 19:13:36 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 316.356140][ T3262] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.363987][ T3262] ieee802154 phy1 wpan1: encryption failed: -22 19:13:36 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) 19:13:36 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:36 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 316.541852][T16386] loop5: detected capacity change from 0 to 264192 19:13:36 executing program 3: r0 = socket(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8904, 0x0) 19:13:36 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:36 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) [ 316.890800][T16399] loop5: detected capacity change from 0 to 264192 19:13:37 executing program 0: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='\'],\x9bQ\x00', &(0x7f00000000c0)='./file0\x00', r1) 19:13:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:37 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:13:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x1, &(0x7f00000017c0)=ANY=[]) 19:13:37 executing program 2: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) 19:13:37 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:37 executing program 2: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) [ 317.486286][T16419] loop5: detected capacity change from 0 to 264192 [ 317.504284][T16418] FAT-fs (loop3): bogus number of reserved sectors 19:13:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:37 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x47f2, &(0x7f00000001c0), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd2}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x10001) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 317.536429][T16418] FAT-fs (loop3): Can't find a valid FAT filesystem 19:13:37 executing program 2: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) 19:13:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$get_persistent(0x6, 0xffffffffffffffff, r1) 19:13:37 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) [ 317.645096][T16418] FAT-fs (loop3): bogus number of reserved sectors [ 317.673110][T16418] FAT-fs (loop3): Can't find a valid FAT filesystem 19:13:37 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x40305828, 0x0) 19:13:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffd, r0, 0x1) 19:13:37 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) getdents64(r0, 0x0, 0x0) 19:13:37 executing program 2: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) 19:13:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x224102a, &(0x7f0000000300)) [ 317.907547][T16446] loop5: detected capacity change from 0 to 264192 19:13:37 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000002c0)='ns/time_for_children\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 19:13:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffd, r0, 0x1) 19:13:37 executing program 2: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) 19:13:37 executing program 3: seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000080)) 19:13:37 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, 0x0, 0x0) 19:13:37 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000001c0)={@link_local, @multicast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty=0xffffffff, @multicast1}}}}}, 0x0) 19:13:38 executing program 3: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/clear_refs\x00', 0x300, 0x0) 19:13:38 executing program 2: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300016f"], 0xe8}}, 0x0) 19:13:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffd, r0, 0x1) 19:13:38 executing program 4: r0 = getpgrp(0xffffffffffffffff) migrate_pages(r0, 0x6, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0xffffffffffffff81) 19:13:38 executing program 0: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0xb, 0xffffffffffffffff, 0x0) [ 318.352824][T16473] loop5: detected capacity change from 0 to 264192 19:13:38 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 19:13:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:38 executing program 3: syz_open_procfs$namespace(0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x0) [ 318.425761][ T9717] Bluetooth: hci5: command 0x0406 tx timeout 19:13:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:38 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 19:13:38 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x5452, 0x0) 19:13:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:38 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) [ 318.689357][T16494] loop4: detected capacity change from 0 to 8 19:13:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000001c0)={@link_local, @multicast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty=0x7f000000, @multicast1}}}}}, 0x0) 19:13:38 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) [ 318.749529][T16499] loop5: detected capacity change from 0 to 264192 [ 318.780910][T16494] unable to read fragment index table 19:13:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:38 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 19:13:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b4d, &(0x7f0000000080)) [ 319.123749][T16519] loop4: detected capacity change from 0 to 8 [ 319.138117][T16520] loop5: detected capacity change from 0 to 264192 [ 319.182679][T16519] unable to read fragment index table 19:13:39 executing program 3: keyctl$get_persistent(0x3, 0xffffffffffffffff, 0x0) 19:13:39 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 19:13:39 executing program 1: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, 0x0, 0x1) 19:13:39 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') setns(r0, 0x0) 19:13:39 executing program 5: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 19:13:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:39 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 19:13:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x3000408, &(0x7f0000000040)=ANY=[@ANYBLOB="e46c9c084b657e540cf4117613c6d8671a3b581c32cb7bd0fdaf3404055f81843a54b5749871d9432a57", @ANYRESDEC]) recvmmsg(0xffffffffffffffff, &(0x7f00000097c0)=[{{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001b00)=""/152, 0x98}, {0x0}, {&(0x7f0000001c80)=""/68, 0x44}, {0x0}, {&(0x7f0000003680)=""/4096, 0x1000}], 0x5, &(0x7f0000001d80)=""/183, 0xb7}, 0x5}, {{&(0x7f0000001e40)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001ec0)=""/230, 0xe6}, {&(0x7f0000004680)=""/4096, 0x1000}], 0x2, &(0x7f0000001fc0)=""/110, 0x6e}, 0x4}, {{&(0x7f0000002040)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000002240)=""/216, 0xd8}, {&(0x7f0000002340)=""/74, 0x4a}, {&(0x7f00000024c0)=""/108, 0x6c}], 0x3, &(0x7f0000002540)=""/81, 0x51}, 0x40}, {{0x0, 0x0, &(0x7f0000008bc0)=[{0x0}, {&(0x7f00000057c0)=""/4096, 0x1000}, {&(0x7f00000067c0)=""/199, 0xc7}, {&(0x7f00000068c0)=""/189, 0xbd}, {&(0x7f0000006980)=""/107, 0x6b}, {&(0x7f00000004c0)=""/48, 0x30}, {&(0x7f0000008a80)=""/146, 0x92}], 0x7, &(0x7f0000008c80)=""/207, 0xcf}, 0x5}, {{&(0x7f0000008d80)=@hci, 0x80, &(0x7f0000009180)=[{&(0x7f0000008e00)=""/106, 0x6a}, {0x0}, {&(0x7f0000008fc0)=""/156, 0x9c}, {&(0x7f0000009080)=""/125, 0x7d}, {&(0x7f0000009100)=""/115, 0x73}], 0x5, &(0x7f0000009200)=""/167, 0xa7}, 0x200}, {{0x0, 0x0, &(0x7f00000094c0)=[{&(0x7f00000092c0)=""/86, 0x56}, {&(0x7f0000009340)=""/148, 0x94}, {&(0x7f0000001940)=""/42, 0x2a}, {&(0x7f00000020c0)=""/61, 0x3d}, {&(0x7f0000009400)=""/145, 0x91}], 0x5, &(0x7f00000021c0)}, 0x3}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000009780)=""/14, 0xe}, 0x7}], 0x7, 0x20, &(0x7f0000009980)) syz_mount_image$tmpfs(0x0, &(0x7f0000002100)='./file0\x00', 0x0, 0x5, &(0x7f00000025c0)=[{&(0x7f0000001680)="226ef55f4b1108185d96350b0cb792179ed7673500b06e7ef019e934b3bbac7660ec76e7f0ad14804362c54431bca54bbbb7f5182676829763db64a78ad6536bd540af5adfcd374e8e5d8b10c777fb230d5fcecfa0af17461c072762075c34b9fcb5cb8a1ede10968e6b9af34611b4825232e766151697818f088d46fbdf00814dc064eae1fa0518a9f162512e7dc0cea8ced6a0e80c203848b28a567afaf1f88fc7bdaa1767aebc1717507bdebd443b3c43073cb9", 0xb5, 0x200000f92}, {&(0x7f00000021c0), 0x0, 0x5}, {&(0x7f0000002200)="d80c600150a17a9cb956f0b363469bff92305f9a694f0258014c08", 0x1b, 0x200}, {&(0x7f0000000000)="49f05b8b81e125aff351297f7f0f56806ec86ae6ec243079d5204e025a093cfe48d01ae90ee58dbc46a6", 0x2a, 0x1}, {0x0}], 0x40090, &(0x7f00000017c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x30, 0x78, 0x6b, 0x25, 0x78, 0x0]}}, {@gid}], [{@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@subj_type={'subj_type', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@obj_role={'obj_role', 0x3d, '\'}@^[(,'}}, {@hash}, {@appraise}, {@audit}, {@fowner_lt}]}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 319.600455][T16539] loop5: detected capacity change from 0 to 264192 [ 319.612327][T16540] loop4: detected capacity change from 0 to 8 19:13:39 executing program 1: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, 0x0, 0x1) 19:13:39 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x5}) 19:13:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x227e, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 319.791505][T16540] unable to read fragment index table 19:13:39 executing program 1: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, 0x0, 0x1) 19:13:40 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 19:13:40 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:40 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xe8}}, 0x0) 19:13:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:40 executing program 5: migrate_pages(0x0, 0x6, 0x0, &(0x7f0000000080)=0xffffffffffffff81) 19:13:40 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xe8}}, 0x0) 19:13:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x3000408, &(0x7f0000000040)=ANY=[@ANYBLOB="e46c9c084b657e540cf4117613c6d8671a3b581c32cb7bd0fdaf3404055f81843a54b5749871d9432a57", @ANYRESDEC]) recvmmsg(0xffffffffffffffff, &(0x7f00000097c0)=[{{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001b00)=""/152, 0x98}, {0x0}, {&(0x7f0000001c80)=""/68, 0x44}, {0x0}, {&(0x7f0000003680)=""/4096, 0x1000}], 0x5, &(0x7f0000001d80)=""/183, 0xb7}, 0x5}, {{&(0x7f0000001e40)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001ec0)=""/230, 0xe6}, {&(0x7f0000004680)=""/4096, 0x1000}], 0x2, &(0x7f0000001fc0)=""/110, 0x6e}, 0x4}, {{&(0x7f0000002040)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000002240)=""/216, 0xd8}, {&(0x7f0000002340)=""/74, 0x4a}, {&(0x7f00000024c0)=""/108, 0x6c}], 0x3, &(0x7f0000002540)=""/81, 0x51}, 0x40}, {{0x0, 0x0, &(0x7f0000008bc0)=[{0x0}, {&(0x7f00000057c0)=""/4096, 0x1000}, {&(0x7f00000067c0)=""/199, 0xc7}, {&(0x7f00000068c0)=""/189, 0xbd}, {&(0x7f0000006980)=""/107, 0x6b}, {&(0x7f00000004c0)=""/48, 0x30}, {&(0x7f0000008a80)=""/146, 0x92}], 0x7, &(0x7f0000008c80)=""/207, 0xcf}, 0x5}, {{&(0x7f0000008d80)=@hci, 0x80, &(0x7f0000009180)=[{&(0x7f0000008e00)=""/106, 0x6a}, {0x0}, {&(0x7f0000008fc0)=""/156, 0x9c}, {&(0x7f0000009080)=""/125, 0x7d}, {&(0x7f0000009100)=""/115, 0x73}], 0x5, &(0x7f0000009200)=""/167, 0xa7}, 0x200}, {{0x0, 0x0, &(0x7f00000094c0)=[{&(0x7f00000092c0)=""/86, 0x56}, {&(0x7f0000009340)=""/148, 0x94}, {&(0x7f0000001940)=""/42, 0x2a}, {&(0x7f00000020c0)=""/61, 0x3d}, {&(0x7f0000009400)=""/145, 0x91}], 0x5, &(0x7f00000021c0)}, 0x3}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000009780)=""/14, 0xe}, 0x7}], 0x7, 0x20, &(0x7f0000009980)) syz_mount_image$tmpfs(0x0, &(0x7f0000002100)='./file0\x00', 0x0, 0x5, &(0x7f00000025c0)=[{&(0x7f0000001680)="226ef55f4b1108185d96350b0cb792179ed7673500b06e7ef019e934b3bbac7660ec76e7f0ad14804362c54431bca54bbbb7f5182676829763db64a78ad6536bd540af5adfcd374e8e5d8b10c777fb230d5fcecfa0af17461c072762075c34b9fcb5cb8a1ede10968e6b9af34611b4825232e766151697818f088d46fbdf00814dc064eae1fa0518a9f162512e7dc0cea8ced6a0e80c203848b28a567afaf1f88fc7bdaa1767aebc1717507bdebd443b3c43073cb9", 0xb5, 0x200000f92}, {&(0x7f00000021c0), 0x0, 0x5}, {&(0x7f0000002200)="d80c600150a17a9cb956f0b363469bff92305f9a694f0258014c08", 0x1b, 0x200}, {&(0x7f0000000000)="49f05b8b81e125aff351297f7f0f56806ec86ae6ec243079d5204e025a093cfe48d01ae90ee58dbc46a6", 0x2a, 0x1}, {0x0}], 0x40090, &(0x7f00000017c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x30, 0x78, 0x6b, 0x25, 0x78, 0x0]}}, {@gid}], [{@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@subj_type={'subj_type', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@obj_role={'obj_role', 0x3d, '\'}@^[(,'}}, {@hash}, {@appraise}, {@audit}, {@fowner_lt}]}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:13:40 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:40 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xe8}}, 0x0) [ 320.773580][T16576] loop4: detected capacity change from 0 to 8 [ 320.892479][T16576] unable to read fragment index table 19:13:41 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@abs, 0x6e) 19:13:41 executing program 3: r0 = socket(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5460, 0x0) 19:13:41 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:41 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[], 0xe8}}, 0x0) 19:13:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:41 executing program 5: syz_emit_ethernet(0x3a, &(0x7f0000000800)={@link_local, @multicast, @void, {@ipv4={0x800, @dccp={{0x7, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x64010101, @multicast1, {[@rr={0x7, 0x7, 0x4, [@initdev={0xac, 0x1e, 0x0, 0x0}]}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d765f8", 0x0, "9c99a9"}}}}}}, 0x0) 19:13:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x3000408, &(0x7f0000000040)=ANY=[@ANYBLOB="e46c9c084b657e540cf4117613c6d8671a3b581c32cb7bd0fdaf3404055f81843a54b5749871d9432a57", @ANYRESDEC]) recvmmsg(0xffffffffffffffff, &(0x7f00000097c0)=[{{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001b00)=""/152, 0x98}, {0x0}, {&(0x7f0000001c80)=""/68, 0x44}, {0x0}, {&(0x7f0000003680)=""/4096, 0x1000}], 0x5, &(0x7f0000001d80)=""/183, 0xb7}, 0x5}, {{&(0x7f0000001e40)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001ec0)=""/230, 0xe6}, {&(0x7f0000004680)=""/4096, 0x1000}], 0x2, &(0x7f0000001fc0)=""/110, 0x6e}, 0x4}, {{&(0x7f0000002040)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000002240)=""/216, 0xd8}, {&(0x7f0000002340)=""/74, 0x4a}, {&(0x7f00000024c0)=""/108, 0x6c}], 0x3, &(0x7f0000002540)=""/81, 0x51}, 0x40}, {{0x0, 0x0, &(0x7f0000008bc0)=[{0x0}, {&(0x7f00000057c0)=""/4096, 0x1000}, {&(0x7f00000067c0)=""/199, 0xc7}, {&(0x7f00000068c0)=""/189, 0xbd}, {&(0x7f0000006980)=""/107, 0x6b}, {&(0x7f00000004c0)=""/48, 0x30}, {&(0x7f0000008a80)=""/146, 0x92}], 0x7, &(0x7f0000008c80)=""/207, 0xcf}, 0x5}, {{&(0x7f0000008d80)=@hci, 0x80, &(0x7f0000009180)=[{&(0x7f0000008e00)=""/106, 0x6a}, {0x0}, {&(0x7f0000008fc0)=""/156, 0x9c}, {&(0x7f0000009080)=""/125, 0x7d}, {&(0x7f0000009100)=""/115, 0x73}], 0x5, &(0x7f0000009200)=""/167, 0xa7}, 0x200}, {{0x0, 0x0, &(0x7f00000094c0)=[{&(0x7f00000092c0)=""/86, 0x56}, {&(0x7f0000009340)=""/148, 0x94}, {&(0x7f0000001940)=""/42, 0x2a}, {&(0x7f00000020c0)=""/61, 0x3d}, {&(0x7f0000009400)=""/145, 0x91}], 0x5, &(0x7f00000021c0)}, 0x3}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000009780)=""/14, 0xe}, 0x7}], 0x7, 0x20, &(0x7f0000009980)) syz_mount_image$tmpfs(0x0, &(0x7f0000002100)='./file0\x00', 0x0, 0x5, &(0x7f00000025c0)=[{&(0x7f0000001680)="226ef55f4b1108185d96350b0cb792179ed7673500b06e7ef019e934b3bbac7660ec76e7f0ad14804362c54431bca54bbbb7f5182676829763db64a78ad6536bd540af5adfcd374e8e5d8b10c777fb230d5fcecfa0af17461c072762075c34b9fcb5cb8a1ede10968e6b9af34611b4825232e766151697818f088d46fbdf00814dc064eae1fa0518a9f162512e7dc0cea8ced6a0e80c203848b28a567afaf1f88fc7bdaa1767aebc1717507bdebd443b3c43073cb9", 0xb5, 0x200000f92}, {&(0x7f00000021c0), 0x0, 0x5}, {&(0x7f0000002200)="d80c600150a17a9cb956f0b363469bff92305f9a694f0258014c08", 0x1b, 0x200}, {&(0x7f0000000000)="49f05b8b81e125aff351297f7f0f56806ec86ae6ec243079d5204e025a093cfe48d01ae90ee58dbc46a6", 0x2a, 0x1}, {0x0}], 0x40090, &(0x7f00000017c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x30, 0x78, 0x6b, 0x25, 0x78, 0x0]}}, {@gid}], [{@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@subj_type={'subj_type', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@obj_role={'obj_role', 0x3d, '\'}@^[(,'}}, {@hash}, {@appraise}, {@audit}, {@fowner_lt}]}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:13:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:41 executing program 3: syz_mount_image$msdos(&(0x7f00000012c0), &(0x7f0000001300)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f00000013c0)={[{@fat=@nocase}]}) 19:13:41 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[], 0xe8}}, 0x0) [ 321.796123][T16601] loop4: detected capacity change from 0 to 8 19:13:41 executing program 5: timerfd_create(0xd, 0x0) 19:13:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) [ 321.933522][T16601] unable to read fragment index table [ 321.961973][T16610] FAT-fs (loop3): bogus number of reserved sectors [ 322.127945][T16610] FAT-fs (loop3): Can't find a valid FAT filesystem 19:13:42 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[], 0xe8}}, 0x0) 19:13:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000002600)=[{&(0x7f0000000440)={0x10, 0x14, 0x1}, 0x10}], 0x1}, 0x0) [ 322.576271][T16610] FAT-fs (loop3): bogus number of reserved sectors 19:13:42 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0xe8}}, 0x0) [ 322.627122][T16610] FAT-fs (loop3): Can't find a valid FAT filesystem 19:13:42 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x3000408, &(0x7f0000000040)=ANY=[@ANYBLOB="e46c9c084b657e540cf4117613c6d8671a3b581c32cb7bd0fdaf3404055f81843a54b5749871d9432a57", @ANYRESDEC]) recvmmsg(0xffffffffffffffff, &(0x7f00000097c0)=[{{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001b00)=""/152, 0x98}, {0x0}, {&(0x7f0000001c80)=""/68, 0x44}, {0x0}, {&(0x7f0000003680)=""/4096, 0x1000}], 0x5, &(0x7f0000001d80)=""/183, 0xb7}, 0x5}, {{&(0x7f0000001e40)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001ec0)=""/230, 0xe6}, {&(0x7f0000004680)=""/4096, 0x1000}], 0x2, &(0x7f0000001fc0)=""/110, 0x6e}, 0x4}, {{&(0x7f0000002040)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000002240)=""/216, 0xd8}, {&(0x7f0000002340)=""/74, 0x4a}, {&(0x7f00000024c0)=""/108, 0x6c}], 0x3, &(0x7f0000002540)=""/81, 0x51}, 0x40}, {{0x0, 0x0, &(0x7f0000008bc0)=[{0x0}, {&(0x7f00000057c0)=""/4096, 0x1000}, {&(0x7f00000067c0)=""/199, 0xc7}, {&(0x7f00000068c0)=""/189, 0xbd}, {&(0x7f0000006980)=""/107, 0x6b}, {&(0x7f00000004c0)=""/48, 0x30}, {&(0x7f0000008a80)=""/146, 0x92}], 0x7, &(0x7f0000008c80)=""/207, 0xcf}, 0x5}, {{&(0x7f0000008d80)=@hci, 0x80, &(0x7f0000009180)=[{&(0x7f0000008e00)=""/106, 0x6a}, {0x0}, {&(0x7f0000008fc0)=""/156, 0x9c}, {&(0x7f0000009080)=""/125, 0x7d}, {&(0x7f0000009100)=""/115, 0x73}], 0x5, &(0x7f0000009200)=""/167, 0xa7}, 0x200}, {{0x0, 0x0, &(0x7f00000094c0)=[{&(0x7f00000092c0)=""/86, 0x56}, {&(0x7f0000009340)=""/148, 0x94}, {&(0x7f0000001940)=""/42, 0x2a}, {&(0x7f00000020c0)=""/61, 0x3d}, {&(0x7f0000009400)=""/145, 0x91}], 0x5, &(0x7f00000021c0)}, 0x3}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000009780)=""/14, 0xe}, 0x7}], 0x7, 0x20, &(0x7f0000009980)) syz_mount_image$tmpfs(0x0, &(0x7f0000002100)='./file0\x00', 0x0, 0x5, &(0x7f00000025c0)=[{&(0x7f0000001680)="226ef55f4b1108185d96350b0cb792179ed7673500b06e7ef019e934b3bbac7660ec76e7f0ad14804362c54431bca54bbbb7f5182676829763db64a78ad6536bd540af5adfcd374e8e5d8b10c777fb230d5fcecfa0af17461c072762075c34b9fcb5cb8a1ede10968e6b9af34611b4825232e766151697818f088d46fbdf00814dc064eae1fa0518a9f162512e7dc0cea8ced6a0e80c203848b28a567afaf1f88fc7bdaa1767aebc1717507bdebd443b3c43073cb9", 0xb5, 0x200000f92}, {&(0x7f00000021c0), 0x0, 0x5}, {&(0x7f0000002200)="d80c600150a17a9cb956f0b363469bff92305f9a694f0258014c08", 0x1b, 0x200}, {&(0x7f0000000000)="49f05b8b81e125aff351297f7f0f56806ec86ae6ec243079d5204e025a093cfe48d01ae90ee58dbc46a6", 0x2a, 0x1}, {0x0}], 0x40090, &(0x7f00000017c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x30, 0x78, 0x6b, 0x25, 0x78, 0x0]}}, {@gid}], [{@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@subj_type={'subj_type', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@obj_role={'obj_role', 0x3d, '\'}@^[(,'}}, {@hash}, {@appraise}, {@audit}, {@fowner_lt}]}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:13:42 executing program 3: syz_mount_image$msdos(&(0x7f00000012c0), &(0x7f0000001300)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f00000013c0)={[{@fat=@nocase}]}) [ 322.754264][T16631] loop4: detected capacity change from 0 to 8 19:13:42 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:42 executing program 5: socketpair(0x37, 0x0, 0x0, &(0x7f0000000100)) 19:13:42 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0xe8}}, 0x0) [ 322.870022][T16631] unable to read fragment index table [ 322.900825][T16641] FAT-fs (loop3): bogus number of reserved sectors [ 322.922264][T16641] FAT-fs (loop3): Can't find a valid FAT filesystem 19:13:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:43 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/150, 0x96}], 0x3, &(0x7f00000006c0)=""/231, 0xe7}}], 0x1, 0x0, &(0x7f0000001300)={0x77359400}) sendmsg$nl_crypto(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) 19:13:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:43 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0xe8}}, 0x0) 19:13:43 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) [ 323.676267][T16663] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 19:13:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 323.719524][T16667] loop4: detected capacity change from 0 to 8 [ 323.728203][T16663] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 19:13:43 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e8000000"], 0xe8}}, 0x0) 19:13:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:43 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 323.827981][T16669] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 323.850635][T16667] unable to read fragment index table [ 323.867970][T16669] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 19:13:43 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000080)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0) 19:13:43 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e8000000"], 0xe8}}, 0x0) 19:13:43 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000800)={@link_local, @dev, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0xb}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d765f8", 0x0, "9c99a9"}}}}}}, 0x0) 19:13:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:43 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f00000002c0)=""/150, 0x96}], 0x2, &(0x7f00000006c0)=""/231, 0xe7}}], 0x1, 0x0, &(0x7f0000001300)={0x77359400}) sendmsg$nl_crypto(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) 19:13:43 executing program 0: r0 = getpgrp(0xffffffffffffffff) setpriority(0x1, r0, 0x0) [ 324.162199][T16685] loop4: detected capacity change from 0 to 8 19:13:44 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:44 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e8000000"], 0xe8}}, 0x0) 19:13:44 executing program 3: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x300, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)) [ 324.252962][T16685] unable to read fragment index table [ 324.305726][T16696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 19:13:44 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r0) [ 324.357251][T16696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 324.379111][T16703] loop3: detected capacity change from 0 to 1 19:13:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 19:13:44 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300"], 0xe8}}, 0x0) [ 324.411401][T16703] FAT-fs (loop3): bogus number of reserved sectors [ 324.434343][T16703] FAT-fs (loop3): Can't find a valid FAT filesystem 19:13:44 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) [ 324.493148][T16703] loop3: detected capacity change from 0 to 1 [ 324.508354][T16703] FAT-fs (loop3): bogus number of reserved sectors [ 324.543421][T16715] loop4: detected capacity change from 0 to 8 [ 324.545592][T16703] FAT-fs (loop3): Can't find a valid FAT filesystem 19:13:44 executing program 0: r0 = fsopen(&(0x7f0000000080)='cpuset\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) [ 324.584542][T16715] unable to read fragment index table 19:13:44 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300"], 0xe8}}, 0x0) 19:13:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000034c0)={&(0x7f0000000040), 0x8, &(0x7f0000003440)=[{&(0x7f0000003500)={0x14e4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x11f9, 0x0, 0x0, 0x1, [@generic="5f5ab0afc45a02d7e1d6eb2f99ce879648cab0771665aa7cb5cadaf4ae3215261d91cf85b9a1842bf2161643bab2623e0709c79d063c26d676a90ca40373d047affeed0856fd4f3e923def938eb194ebb108d2ec440b8bebbe5b722e41f3f1fff8c4f698dcac61ff0252d5459ec197a8fdfce569959cd4adbb9766b68d287beb3a8c5b2716f0bb2d4346fefedea33a7f84a570d43afbebe89241cac4c4fb2ce56355d0254df6517311205db2ae4913ac134f5bde4ffcca097e7d9a499889fb92ae8898bcfa9855e53f7cd0858628e9c193719427c1bef5882ae9870fc5c3e61c583006f142b0a8e3cb8434b7", @generic="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", @generic="3d7d3d09e3de43026401ac5af5b97fee625a992b751aff72a6be4e7ad6455b0b2ba8222b576e7bb1e1708f67a28685e27d8f3a13fc9b09cdc2b6178ce62b37203dad5c972ff932efd382749a271db11c172e6239612ca9734d3f838a6c1aab0d5f1f317a6adea0f9a17c2a400f566aa2ded4b6ccb23d2e7c78f11bd4f5debf1571855d3ae09b69721730a6c9d179717d538be64b60ab3508069a740944", @typed={0x5d, 0x0, 0x0, 0x0, @binary="4ee81eb9df37096857642d8166ee57450fc9a3bab3861b037942bb465ccf73d77a29dfeb3f9101f1bad632ed8c26d4b603efde4eafc5ba0f9399274c08cd7a71f0cb39f79a01275071dc4d6f987f3104267dd4014eabe5ceae"}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @nested={0x1c9, 0x0, 0x0, 0x1, [@generic="7c0699af0c0f2f69df1d17117fd020d2d48cdfc3a6e8f61190927d9e6f205ed8977d46a71096dfa5c593b7e7a73176c818fe13e725509a80a61d15e24b0964d429487d1c9efe9902ea7411ae905a9ee4549732a55d41ee9aea4816b3ad6706c4a1c5885403362581c90a028f16ed5c555d40d3d815ddfe4f45f83238da8cf57e0934c5da1eab3693caec82de95e87717c0d9a49a1425b07f87b8e2e8ff29f0a870a6342166f22648d218bf1082c4cc63fbb0d4d324f9793a60f4", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="121e39fca60141f9deff3a826658a206fbddb074591988ff3b825705c3c48941fe0499fc26852f4997f508ed9697dbc0753fc78d5e2266acc07419a42b74959b9718248aa53744c43f0c4f7b7fc9642061fdefe5e9dcd43424c7605b0ad6f516de7c9371471305c1a62454019de8fde94c8d78ac3e0b8559ef61edc9b115cea0361f814be28ab33c0f0f4c8fb0f199990c4bfc9c3cee8979ebdedbc99290ae0b", @generic="17eafec70aec701a23dd6a7e64aefeca71168cf76488df43630556481b06679d137a466b6c0b5e13267593e950d265a9f75d794c2f19d6ece5644fee8035b7394aeed5ed0d2ac115d3056d5237a3de258fc012b6fb6af436267d3f", @typed={0x8, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}]}, @generic="b77d16720f59d1fdfb5aeaa7848719f182f00232c4881aef8043b1567bec68ce0d40e6a85bf5a3f6e4b0f94f6af7eeb7ddc85cead0a3b6f97ac7afd6ff366e2604b1313812bfccb3437681bfd0023f3c44bd384592b2db19dd4e3af24812fc0bbc624cd9f7e74eb176f4172f2a7fa736031801b3abcafe6e9f877a50c5c611f5b6d687117eafb59a2fa141c75e679cb6f9296ba7a62773a173695e7e149c185a09636ada66502dc9cd033603b3192d4383912381c5eac9f92dd4f5594fbe", @generic="d8f86fa63b7daff23cc59ac64465b6ee7ea41020b450", @generic="a106d53cdf1854c4f52b7f3041d76ad880122a8c152fe7dff1"]}, 0x14e4}, {&(0x7f0000001600)={0x9e0, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xd5, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x6, 0x0, 0x0, 0x0, @str='}\x00'}, @generic="36918aaf24ffa8bf68f0d76ad9a5adbeb8216803faf18cea2468230f9e5e35708aeb7f443646ae51c7d26e2a8a526b30be91df0de2f2cb42c5a1cd5ab4bd55c6e1ba09e42cf15957f21f1cf94edd988d9fd6c71e470007307ba085503c4aa656a4721511acf03b990498b37d2e832b3290a4d206cc2ff5f6f2b8fe82d21aa5021fa1c6bcd7d644614afa217b23d21f6f64321fc87afc43863aac6982ff6607f423b1efb0d425b613eb2eb0140c3fd9a9743b80656a8a2614698371beef4b8453f4"]}, @nested={0x8e9, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private}, @generic="7d73d22fad8db22a83f86d847044d9290dd383588046129f6666f24ff3959ec0afede57ccc02879888c65d4951810bf2d55624acd0bfe4abc04e08b35b184cb3f441f7e1121f00d7fb48061440e4f90be51dad8835f972dcbc8a7df08b45238464b29c4404dd1218ec02e779bcd3e733", @generic="69ef2ad85c9ab68f75ee873e125f3031b023d689683efe5221a2e0b59826410060158e6953b594aae2453e02a80df7535d8f6ff8ac3dc24b2993433a26365458fd63552ade8dad86c092fcedccb100f7a067efed1422e7cddeecaa1d85ca7e06d107eec7ed04af7fe4f1eb72a12f24ed58ce395f3c945ba4084420122a6840ce8e16bcba7e5797c5adbc3ad3003e32a2975d9932293f86340a0ff80b94d1d23b5b", @typed={0x7c9, 0x0, 0x0, 0x0, @binary="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"}]}]}, 0x9e0}], 0x2}, 0x0) 19:13:44 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:44 executing program 3: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file1\x00', 0x0, 0x1) creat(&(0x7f0000000180)='./file0\x00', 0x0) linkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00', 0x0) 19:13:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4bfa, &(0x7f0000000080)) [ 324.797469][T16730] new mount options do not match the existing superblock, will be ignored 19:13:44 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:44 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653fd0531f453e02498fbde0700ae8904a4000026b073639a1e954d5ab555b1dd249c54f2b004e3dcdd1ff467e4d32711921cc5e41e4a2133d1c3daef7906b9eb4c29c07a5ff5a326e865f6fb27971296f3b66db4f4f5e7919112bb21ed844fc3f7303bd28fd81d02acf4994b373340e7e151f7427d02cca0aaa71eeed9a1ddae2e2b209686c4c5bc2831155c2b94186fff232f51c529b6d3a470fdb290026a41c84e061802f8846f005c188914cab9b79f0f7979b62f6a80060e59d23e75c94fdeec75cc893e38b715d4b084469440a534efdeaaeffa836e449c4a53b2ed5c3c1bf2b2ab14763f118df0ca3a", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() tkill(r2, 0x1e) 19:13:44 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e80000001300"], 0xe8}}, 0x0) [ 324.899106][T16737] loop4: detected capacity change from 0 to 8 [ 324.920851][T16738] loop3: detected capacity change from 0 to 264192 19:13:44 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) [ 325.022647][T16737] unable to read fragment index table 19:13:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4bfa, &(0x7f0000000080)) [ 325.071085][T16751] ptrace attach of "/root/syz-executor.0"[16749] was attempted by "/root/syz-executor.0"[16751] 19:13:44 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000001c0)={0x0, 0x0}) 19:13:44 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) 19:13:44 executing program 3: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file1\x00', 0x0, 0x1) creat(&(0x7f0000000180)='./file0\x00', 0x0) linkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00', 0x0) 19:13:44 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4bfa, &(0x7f0000000080)) [ 325.299897][T16766] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.339093][T16769] loop4: detected capacity change from 0 to 8 19:13:45 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) [ 325.354308][T16771] loop3: detected capacity change from 0 to 264192 19:13:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4bfa, &(0x7f0000000080)) [ 325.479726][T16769] unable to read fragment index table [ 325.483312][T16778] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 19:13:45 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) 19:13:45 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) [ 325.667602][T16786] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.719481][T16790] loop3: detected capacity change from 0 to 8 [ 325.768066][T16790] SQUASHFS error: zstd decompression error: 2 [ 325.774636][T16790] SQUASHFS error: zstd decompression failed, data probably corrupt [ 325.796262][T16790] SQUASHFS error: Failed to read block 0x108: -5 [ 325.802863][T16790] SQUASHFS error: Unable to read metadata cache entry [106] [ 325.810522][T16790] SQUASHFS error: Unable to read inode 0x11e [ 325.893260][T16790] loop3: detected capacity change from 0 to 8 [ 325.923491][T16790] SQUASHFS error: zstd decompression error: 2 [ 325.930683][T16790] SQUASHFS error: zstd decompression failed, data probably corrupt [ 325.939940][T16790] SQUASHFS error: Failed to read block 0x108: -5 [ 325.948654][T16790] SQUASHFS error: Unable to read metadata cache entry [106] [ 325.956836][T16790] SQUASHFS error: Unable to read inode 0x11e 19:13:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4bfa, &(0x7f0000000080)) 19:13:45 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:45 executing program 2: keyctl$get_persistent(0x7, 0xffffffffffffffff, 0x0) 19:13:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:45 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) 19:13:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4bfa, &(0x7f0000000080)) [ 326.242634][T16812] loop4: detected capacity change from 0 to 8 [ 326.270822][T16815] loop3: detected capacity change from 0 to 8 19:13:46 executing program 2: keyctl$get_persistent(0x4, 0xffffffffffffffff, 0xffffffffffffffff) 19:13:46 executing program 0: migrate_pages(0xffffffffffffffff, 0x5, 0x0, 0x0) [ 326.395483][T16812] unable to read fragment index table [ 326.433951][T16815] SQUASHFS error: zstd decompression error: 2 19:13:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x1) [ 326.469971][T16815] SQUASHFS error: zstd decompression failed, data probably corrupt 19:13:46 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 326.545451][T16815] SQUASHFS error: Failed to read block 0x108: -5 [ 326.552088][T16815] SQUASHFS error: Unable to read metadata cache entry [106] 19:13:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4bfa, &(0x7f0000000080)) 19:13:46 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x467c2, 0x0) 19:13:46 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/222, 0xde}], 0x1, 0x0, 0x0) [ 326.640813][T16815] SQUASHFS error: Unable to read inode 0x11e [ 326.687870][T16832] loop4: detected capacity change from 0 to 8 19:13:46 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffd, r0, 0x1) [ 326.788492][T16832] unable to read fragment index table 19:13:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4bfa, &(0x7f0000000080)) 19:13:46 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x0, 0x40c00) read$usbmon(r0, 0x0, 0x0) 19:13:46 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @source_quench={0xd, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @broadcast}}}}}}, 0x0) 19:13:46 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffd, r0, 0x1) 19:13:46 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @source_quench={0xd, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @broadcast}}}}}}, 0x0) [ 327.004170][T16849] loop3: detected capacity change from 0 to 8 [ 327.106396][T16849] SQUASHFS error: zstd decompression error: 2 [ 327.129472][T16856] loop4: detected capacity change from 0 to 8 [ 327.143041][T16849] SQUASHFS error: zstd decompression failed, data probably corrupt 19:13:46 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f147a8378f3646027b2c66538d0fcc04770d68fa977ab6b68fe7ffdc571c17c78e15dd8ef7b82c0d1472caeafdfa863dd1d2", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffeff}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:13:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4bfa, &(0x7f0000000080)) [ 327.144172][T16018] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 327.195327][ T2163] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.201356][T16849] SQUASHFS error: Failed to read block 0x108: -5 [ 327.207455][ T2163] Buffer I/O error on dev loop4, logical block 0, async page read [ 327.237955][T16849] SQUASHFS error: Unable to read metadata cache entry [106] 19:13:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffd, r0, 0x1) 19:13:47 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @source_quench={0xd, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @broadcast}}}}}}, 0x0) [ 327.285592][T16849] SQUASHFS error: Unable to read inode 0x11e [ 327.301497][T16856] unable to read fragment index table [ 327.397292][T16867] ptrace attach of "/root/syz-executor.2"[16866] was attempted by "/root/syz-executor.2"[16867] 19:13:47 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:47 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:47 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(0xffffffffffffffff, 0x4bfa, &(0x7f0000000080)) 19:13:47 executing program 2: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x0) write$sysctl(r0, 0x0, 0x0) 19:13:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, 0x0, 0x1) 19:13:47 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @source_quench={0xd, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @broadcast}}}}}}, 0x0) [ 327.517150][T16876] loop4: detected capacity change from 0 to 8 19:13:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, 0x0, 0x1) [ 327.597686][T16876] unable to read fragment index table 19:13:47 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(0xffffffffffffffff, 0x4bfa, &(0x7f0000000080)) [ 327.662254][T16885] loop3: detected capacity change from 0 to 8 19:13:47 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 19:13:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, 0x0, 0x1) [ 327.747727][T16885] SQUASHFS error: zstd decompression error: 2 [ 327.778354][T16885] SQUASHFS error: zstd decompression failed, data probably corrupt [ 327.825878][T16885] SQUASHFS error: Failed to read block 0x108: -5 [ 327.869134][T16885] SQUASHFS error: Unable to read metadata cache entry [106] 19:13:47 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(0xffffffffffffffff, 0x4bfa, &(0x7f0000000080)) 19:13:47 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 327.921083][T16885] SQUASHFS error: Unable to read inode 0x11e 19:13:47 executing program 3: syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:47 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 19:13:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) [ 328.096313][T16903] loop4: detected capacity change from 0 to 8 [ 328.230681][T16903] unable to read fragment index table [ 328.264625][T16910] loop3: detected capacity change from 0 to 8 19:13:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) 19:13:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4bfa, 0x0) 19:13:48 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x4020940d, 0x0) 19:13:48 executing program 3: syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:48 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 19:13:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 328.493505][T16923] loop3: detected capacity change from 0 to 8 19:13:48 executing program 3: syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4bfa, 0x0) 19:13:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) 19:13:48 executing program 0: inotify_init() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') pipe2(&(0x7f00000001c0), 0x800) mkdir(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/61, 0x3d, 0x0) 19:13:48 executing program 2: r0 = socket(0x26, 0x5, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 19:13:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 328.761915][T16939] loop3: detected capacity change from 0 to 8 19:13:48 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x22060400) r0 = gettid() tkill(r0, 0x34) ptrace(0x10, r0) 19:13:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4bfa, 0x0) 19:13:48 executing program 0: inotify_init() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') pipe2(&(0x7f00000001c0), 0x800) mkdir(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/61, 0x3d, 0x0) 19:13:48 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:48 executing program 2: inotify_init() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') pipe2(&(0x7f00000001c0), 0x800) mkdir(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/61, 0x3d, 0x0) 19:13:48 executing program 1: syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x450280) 19:13:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:48 executing program 0: inotify_init() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') pipe2(&(0x7f00000001c0), 0x800) mkdir(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/61, 0x3d, 0x0) 19:13:48 executing program 5: r0 = socket(0x26, 0x5, 0x0) bind$unix(r0, 0x0, 0x1800) 19:13:48 executing program 2: r0 = fsopen(&(0x7f0000000040)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 329.106938][T16963] loop3: detected capacity change from 0 to 8 [ 329.134929][T16966] loop4: detected capacity change from 0 to 8 19:13:48 executing program 1: keyctl$get_persistent(0x14, 0xffffffffffffffff, 0x0) 19:13:49 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe8, 0x13, 0x1, 0x0, 0x0, {{'morus640-sse2\x00'}}, [{0x8, 0x300}]}, 0xe8}}, 0x0) 19:13:49 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:49 executing program 0: inotify_init() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') pipe2(&(0x7f00000001c0), 0x800) mkdir(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/61, 0x3d, 0x0) [ 329.250945][T16966] unable to read fragment index table 19:13:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x844, &(0x7f0000000080), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x80800}, 0x10001) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 19:13:49 executing program 1: keyctl$get_persistent(0x11, 0xffffffffffffffff, 0x0) [ 329.392259][T16986] loop3: detected capacity change from 0 to 8 19:13:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:49 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5}, {0x5}]}]}, 0x40}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 19:13:49 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbff}, 0xc) sendmsg$netlink(r0, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000000080)=ANY=[], 0x14e4}], 0x1}, 0x0) 19:13:49 executing program 2: r0 = fsopen(&(0x7f0000000080)='cpuset\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) 19:13:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000034c0)={&(0x7f0000000040), 0xc, &(0x7f0000003440)=[{&(0x7f0000003500)={0xf, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x11f9, 0x0, 0x0, 0x1, [@generic="5f5ab0afc45a02d7e1d6eb2f99ce879648cab0771665aa7cb5cadaf4ae3215261d91cf85b9a1842bf2161643bab2623e0709c79d063c26d676a90ca40373d047affeed0856fd4f3e923def938eb194ebb108d2ec440b8bebbe5b722e41f3f1fff8c4f698dcac61ff0252d5459ec197a8fdfce569959cd4adbb9766b68d287beb3a8c5b2716f0bb2d4346fefedea33a7f84a570d43afbebe89241cac4c4fb2ce56355d0254df6517311205db2ae4913ac134f5bde4ffcca097e7d9a499889fb92ae8898bcfa9855e53f7cd0858628e9c193719427c1bef5882ae9870fc5c3e61c583006f142b0a8e3cb8434b7", @generic="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", @generic="3d7d3d09e3de43026401ac5af5b97fee625a992b751aff72a6be4e7ad6455b0b2ba8222b576e7bb1e1708f67a28685e27d8f3a13fc9b09cdc2b6178ce62b37203dad5c972ff932efd382749a271db11c172e6239612ca9734d3f838a6c1aab0d5f1f317a6adea0f9a17c2a400f566aa2ded4b6ccb23d2e7c78f11bd4f5debf1571855d3ae09b69721730a6c9d179717d538be64b60ab3508069a740944", @typed={0x5d, 0x0, 0x0, 0x0, @binary="4ee81eb9df37096857642d8166ee57450fc9a3bab3861b037942bb465ccf73d77a29dfeb3f9101f1bad632ed8c26d4b603efde4eafc5ba0f9399274c08cd7a71f0cb39f79a01275071dc4d6f987f3104267dd4014eabe5ceae"}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @nested={0x1c9, 0x0, 0x0, 0x1, [@generic="7c0699af0c0f2f69df1d17117fd020d2d48cdfc3a6e8f61190927d9e6f205ed8977d46a71096dfa5c593b7e7a73176c818fe13e725509a80a61d15e24b0964d429487d1c9efe9902ea7411ae905a9ee4549732a55d41ee9aea4816b3ad6706c4a1c5885403362581c90a028f16ed5c555d40d3d815ddfe4f45f83238da8cf57e0934c5da1eab3693caec82de95e87717c0d9a49a1425b07f87b8e2e8ff29f0a870a6342166f22648d218bf1082c4cc63fbb0d4d324f9793a60f4", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="121e39fca60141f9deff3a826658a206fbddb074591988ff3b825705c3c48941fe0499fc26852f4997f508ed9697dbc0753fc78d5e2266acc07419a42b74959b9718248aa53744c43f0c4f7b7fc9642061fdefe5e9dcd43424c7605b0ad6f516de7c9371471305c1a62454019de8fde94c8d78ac3e0b8559ef61edc9b115cea0361f814be28ab33c0f0f4c8fb0f199990c4bfc9c3cee8979ebdedbc99290ae0b", @generic="17eafec70aec701a23dd6a7e64aefeca71168cf76488df43630556481b06679d137a466b6c0b5e13267593e950d265a9f75d794c2f19d6ece5644fee8035b7394aeed5ed0d2ac115d3056d5237a3de258fc012b6fb6af436267d3f", @typed={0x8, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}]}, @generic="b77d16720f59d1fdfb5aeaa7848719f182f00232c4881aef8043b1567bec68ce0d40e6a85bf5a3f6e4b0f94f6af7eeb7ddc85cead0a3b6f97ac7afd6ff366e2604b1313812bfccb3437681bfd0023f3c44bd384592b2db19dd4e3af24812fc0bbc624cd9f7e74eb176f4172f2a7fa736031801b3abcafe6e9f877a50c5c611f5b6d687117eafb59a2fa141c75e679cb6f9296ba7a62773a173695e7e149c185a09636ada66502dc9cd033603b3192d4383912381c5eac9f92dd4f5594fbe", @generic="d8f86fa63b7daff23cc59ac64465b6ee7ea41020b450", @generic="a106d53cdf1854c4f52b7f3041d76ad880122a8c152fe7dff1"]}, 0x14e4}, {&(0x7f0000001600)={0x9e0, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xd5, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x6, 0x0, 0x0, 0x0, @str='}\x00'}, @generic="36918aaf24ffa8bf68f0d76ad9a5adbeb8216803faf18cea2468230f9e5e35708aeb7f443646ae51c7d26e2a8a526b30be91df0de2f2cb42c5a1cd5ab4bd55c6e1ba09e42cf15957f21f1cf94edd988d9fd6c71e470007307ba085503c4aa656a4721511acf03b990498b37d2e832b3290a4d206cc2ff5f6f2b8fe82d21aa5021fa1c6bcd7d644614afa217b23d21f6f64321fc87afc43863aac6982ff6607f423b1efb0d425b613eb2eb0140c3fd9a9743b80656a8a2614698371beef4b8453f4"]}, @nested={0x8e9, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private}, @generic="7d73d22fad8db22a83f86d847044d9290dd383588046129f6666f24ff3959ec0afede57ccc02879888c65d4951810bf2d55624acd0bfe4abc04e08b35b184cb3f441f7e1121f00d7fb48061440e4f90be51dad8835f972dcbc8a7df08b45238464b29c4404dd1218ec02e779bcd3e733", @generic="69ef2ad85c9ab68f75ee873e125f3031b023d689683efe5221a2e0b59826410060158e6953b594aae2453e02a80df7535d8f6ff8ac3dc24b2993433a26365458fd63552ade8dad86c092fcedccb100f7a067efed1422e7cddeecaa1d85ca7e06d107eec7ed04af7fe4f1eb72a12f24ed58ce395f3c945ba4084420122a6840ce8e16bcba7e5797c5adbc3ad3003e32a2975d9932293f86340a0ff80b94d1d23b5b", @typed={0x7c9, 0x0, 0x0, 0x0, @binary="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"}]}]}, 0x9e0}], 0x2}, 0x0) [ 329.593722][T16998] loop4: detected capacity change from 0 to 8 19:13:49 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000001340), 0x6000, 0x0) [ 329.671378][T17006] loop3: detected capacity change from 0 to 8 [ 329.683581][T16998] unable to read fragment index table [ 329.701664][T17008] new mount options do not match the existing superblock, will be ignored 19:13:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x541d, 0x0) [ 329.737392][T17008] new mount options do not match the existing superblock, will be ignored 19:13:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)={[{@fat=@dos1xfloppy}, {@fat=@codepage={'codepage', 0x3d, '861'}}]}) 19:13:49 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:49 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, 0x0, 0x0) 19:13:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)='\x81@\'\x00') 19:13:49 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)={[{@fat=@discard}, {@fat=@quiet}, {@fat=@check_strict}, {@fat=@dmask}, {@fat=@fmask}, {@fat=@fmask={'fmask', 0x3d, 0x80000000}}]}) 19:13:49 executing program 5: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000003c0)) 19:13:49 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x2, 0x544000) [ 329.990880][T17026] loop3: detected capacity change from 0 to 1 [ 330.069488][T17026] attempt to access beyond end of device [ 330.069488][T17026] loop3: rw=2048, want=8, limit=1 [ 330.088724][T17028] loop4: detected capacity change from 0 to 8 19:13:49 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653fd0531f453e02498fbde0700ae8904a4000026b073639a1e954d5ab555b1dd249c54f2b004e3dcdd1ff467e4d32711921cc5e41e4a2133d1c3daef7906b9eb4c29c07a5ff5a326e865f6fb27971296f3b66db4f4f5e7919112bb21ed844fc3f7303bd28fd81d02acf4994b373340e7e151f7427d02cca0aaa71eeed9a1ddae2e2b209686c4c5bc2831155c2b94186fff232f51c529b6d3a470fdb290026a41c84e061802f8846f005c188914cab9b79f0f7979b62f6a80060e59d23e75c94fdeec75cc893e38b715d4b084469440a534efdeaaeffa836e449c4a53b2ed5c3c1bf2b2ab14763f118df0ca3abfe046d64e33aeb08690ac2aa05529459d1e5681594a0a0520fb736167", 0x10a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() tkill(r2, 0x1e) 19:13:49 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f147a8378f3646027b2c66538d0fcc04770d68fa977ab6b68fe7ffdc571c17c78e15dd8ef7b82c0d1472caeafdfa863dd1d2", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffeff}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 330.148376][T17026] SQUASHFS error: Failed to read block 0x0: -5 [ 330.180725][T17028] unable to read fragment index table [ 330.189984][T17026] unable to read squashfs_super_block 19:13:50 executing program 1: keyctl$get_persistent(0x4, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) 19:13:50 executing program 5: keyctl$get_persistent(0xd, 0xffffffffffffffff, 0x0) 19:13:50 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 330.369127][T17048] ptrace attach of "/root/syz-executor.2"[17047] was attempted by "/root/syz-executor.2"[17048] 19:13:50 executing program 5: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f00000003c0)) 19:13:50 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x844, &(0x7f0000000080), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r5, 0x0}, 0x10001) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) [ 330.420116][T17053] ptrace attach of "/root/syz-executor.0"[17050] was attempted by "/root/syz-executor.0"[17053] 19:13:50 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xc020660b, 0x0) 19:13:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001240), 0x42, &(0x7f00000012c0)={[{@fat=@tz_utc}, {@fat=@check_normal}]}) [ 330.497504][T17057] loop3: detected capacity change from 0 to 1 19:13:50 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@multicast, @empty, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote, {[@lsrr={0x83, 0x3}]}}}}}}, 0x0) [ 330.556518][T17057] attempt to access beyond end of device [ 330.556518][T17057] loop3: rw=2048, want=8, limit=1 [ 330.561634][T17064] loop4: detected capacity change from 0 to 8 [ 330.594468][T17057] SQUASHFS error: Failed to read block 0x0: -5 [ 330.634264][T17057] unable to read squashfs_super_block 19:13:50 executing program 1: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x0) 19:13:50 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xc0045878, 0x0) 19:13:50 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 330.755136][T17064] unable to read fragment index table 19:13:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x5424, &(0x7f0000000080)) 19:13:50 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe8, 0x13, 0x1, 0x0, 0x0, {{'morus640-sse2\x00'}}, [{0x4}]}, 0xe8}}, 0x0) 19:13:50 executing program 0: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='(%}]\'@-/[/#*\x00', 0xfffffffffffffffe) [ 330.871866][T17076] syz-executor.1 (17076): drop_caches: 0 [ 330.874118][T17081] loop3: detected capacity change from 0 to 1 19:13:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:50 executing program 1: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) [ 330.947374][T17081] attempt to access beyond end of device [ 330.947374][T17081] loop3: rw=2048, want=8, limit=1 [ 331.008339][T17081] SQUASHFS error: Failed to read block 0x0: -5 [ 331.024782][T17087] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 331.046007][T17081] unable to read squashfs_super_block 19:13:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$get_persistent(0x8, 0xffffffffffffffff, r1) [ 331.081519][T17092] loop4: detected capacity change from 0 to 8 19:13:50 executing program 0: pselect6(0x7e, &(0x7f0000000180), &(0x7f00000001c0), 0x0, &(0x7f0000000280), 0x0) 19:13:50 executing program 5: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x2) 19:13:50 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) 19:13:50 executing program 1: r0 = socket(0x26, 0x5, 0x0) bind$unix(r0, &(0x7f0000003840)=@file={0x0, './file0\x00'}, 0x6e) [ 331.189540][T17092] unable to read fragment index table 19:13:51 executing program 2: socket$inet(0x2, 0xa, 0x9c88) 19:13:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000001a40)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_LINK={0xa0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0x1dfc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "d301bd6b3ce28a7055413cabcf76e73833a8f8806c1d4c83b95bcc69a5"}}, @TIPC_NLA_NODE_ID={0x1001, 0x3, "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"}, @TIPC_NLA_NODE_ID={0xad, 0x3, "1781b298cb0e63171e4c4e443994a6baf20fdf4f12bebee216fe53433ca314c370206c7f8a0684be78c653ed7acc7a9ee3d859c20dbb7739b6e8ed9318e2cae17d891ee11ca9a8d8a90102949b0a3b4e606cc4fd07e67416dd274f7d86f3536c7179363efead7287aed39a9a23c7fb8a74dc8f8bdfd1d0b50492f71242f590b762b61d174212486da33127c8d26deaaa0da8deb5b87e849786ef3cf94df04ebf84a14df3d45d8640e4"}, @TIPC_NLA_NODE_ID={0xce9, 0x3, "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"}]}]}, 0x1ec4}}, 0x0) 19:13:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:51 executing program 5: prlimit64(0x0, 0xb87d2c287f53cfff, 0x0, 0x0) 19:13:51 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) 19:13:51 executing program 1: keyctl$get_persistent(0x4, 0xffffffffffffffff, 0x0) 19:13:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @local, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @rand_addr=0x64010101, {[@timestamp={0x44, 0x8, 0x5, 0x3, 0x0, [0x0]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 19:13:51 executing program 0: syz_open_dev$rtc(&(0x7f0000000080), 0x0, 0x410282) [ 331.496159][T17120] loop4: detected capacity change from 0 to 8 19:13:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b63, 0x0) 19:13:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x400000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 19:13:51 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x2, 0x970000) 19:13:51 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) [ 331.602669][T17120] unable to read fragment index table 19:13:51 executing program 0: keyctl$get_persistent(0x13, 0xffffffffffffffff, 0x0) 19:13:51 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="e8000000130001"], 0xe8}}, 0x0) 19:13:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x400000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 19:13:51 executing program 2: r0 = socket(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8980, 0x0) 19:13:51 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:13:51 executing program 1: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x94m', 0x0) 19:13:51 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653fd0531f453e02498fbde0700ae8904a4000026b073639a1e954d5ab555b1dd249c54f2b004e3dcdd1ff467e4d32711921cc5e41e4a2133d1c3daef7906b9eb4c29c07a5ff5a326e865f6fb27971296f3b66db4f4f5e7919112bb21ed844fc3f7303bd28fd81d02acf4994b373340e7e151f7427d02cca0aaa71eeed9a1ddae2e2b209686c4c5bc2831155c2b94186fff232f51c529b6d3a470fdb290026a41c84e061802f8846f005c", 0xab}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() tkill(r2, 0x1e) [ 331.907410][T17147] loop4: detected capacity change from 0 to 8 [ 331.936647][T17149] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 19:13:51 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x48000, 0x0) [ 331.976547][T17149] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 332.001917][T17155] loop3: detected capacity change from 0 to 8 [ 332.009826][T17147] unable to read fragment index table 19:13:51 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x5421, 0x0) [ 332.057619][T17155] Can't find a SQUASHFS superblock on loop3 19:13:51 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x4, 0x0) 19:13:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:51 executing program 0: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x8203, &(0x7f00000003c0)={[{@fat=@dos1xfloppy}]}) [ 332.110290][T17160] ptrace attach of "/root/syz-executor.0"[17159] was attempted by "/root/syz-executor.0"[17160] 19:13:51 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:13:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000034c0)={0x0, 0x0, 0x0}, 0x0) connect$netlink(r0, &(0x7f0000000000), 0xc) 19:13:52 executing program 1: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x844, &(0x7f0000000080), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r5, 0x0}, 0x10001) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 19:13:52 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000000)=ANY=[], 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 19:13:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x5452, &(0x7f0000000080)={0x0, 0x40}) [ 332.314542][T17174] loop4: detected capacity change from 0 to 8 [ 332.381179][T17177] loop3: detected capacity change from 0 to 8 [ 332.403240][T17174] unable to read fragment index table [ 332.415077][T17177] Can't find a SQUASHFS superblock on loop3 19:13:52 executing program 5: keyctl$get_persistent(0xa, 0xffffffffffffffff, 0x0) 19:13:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffd, r0, 0x0) 19:13:52 executing program 2: clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040), 0xfffffd6a}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x44, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 19:13:52 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:13:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) inotify_rm_watch(r0, 0x0) 19:13:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x7fffffff, 0x4) 19:13:52 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x2}, r1) [ 332.719894][T17201] loop3: detected capacity change from 0 to 8 [ 332.755789][T17203] ptrace attach of "/root/syz-executor.2"[17202] was attempted by "/root/syz-executor.2"[17203] [ 332.776525][T17205] loop4: detected capacity change from 0 to 8 [ 332.783970][T17201] Can't find a SQUASHFS superblock on loop3 19:13:52 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000800)={@link_local, @multicast, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d765f8", 0x0, "9c99a9"}}}}}}, 0x0) [ 332.851184][T17205] unable to read fragment index table 19:13:52 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:13:52 executing program 0: keyctl$get_persistent(0x4, 0xffffffffffffffff, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 19:13:52 executing program 5: pipe2(&(0x7f0000000e40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_freezer_state(r0, &(0x7f00000000c0)='THAWED\x00', 0x7) write$sysctl(r0, &(0x7f0000000000)='0\x00', 0x2) 19:13:52 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @remote, @remote={0xac, 0x14, 0x16}}, @address_request={0x14}}}}}, 0x0) 19:13:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:52 executing program 2: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000004001400d000020004", 0x1d}], 0x0, &(0x7f0000010300)) 19:13:52 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653fd0531f453e02498fbde0700ae8904a4000026b073639a1e954d5ab555b1dd249c54f2b004e3dcdd1ff467e4d32711921cc5e41e4a2133d1c3daef7906b9eb4c29c07a5ff5a326e865f6fb27971296f3b66db4f4f5e7919112bb21ed844fc3f7303bd28fd81d02acf4994b373340e7e151f7427d02cca0aaa71eeed9a1ddae2e2b209686c4c5bc2831155c2b94186fff232f51c529b6d3a470fdb290026a41c84e061802f8846f005c188914cab9b79f0f7979b62f6a80060e59d23e75c94fdeec75cc893e38b715d4b084469440a534efdeaaeffa836e449c4a53b2ed5c3c1bf2b2ab14763f118df0ca3abfe046d6", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() tkill(r2, 0x1e) [ 333.114386][T17228] loop3: detected capacity change from 0 to 8 19:13:52 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe8, 0x13, 0x0, 0x0, 0x0, {{'morus640-sse2\x00'}}, [{0x8}]}, 0xec0}}, 0x0) 19:13:52 executing program 1: pipe2(&(0x7f0000001600)={0xffffffffffffffff}, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 333.172428][T17233] loop4: detected capacity change from 0 to 8 [ 333.182086][T17228] Can't find a SQUASHFS superblock on loop3 19:13:53 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$khugepaged_scan(r0, &(0x7f0000000000), 0x1ffffedc) 19:13:53 executing program 5: r0 = socket(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x80108906, 0x0) [ 333.281721][T17241] ptrace attach of "/root/syz-executor.5"[17238] was attempted by "/root/syz-executor.5"[17241] [ 333.286173][T17233] unable to read fragment index table 19:13:53 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:13:53 executing program 0: socket(0x26, 0x5, 0x1000) 19:13:53 executing program 1: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x3, 0xffffffffffffffff, 0x0) 19:13:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:53 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000006400), 0x1, 0x0) read$usbmon(r0, &(0x7f0000000040)=""/4, 0x4) 19:13:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) [ 333.528162][T17257] loop3: detected capacity change from 0 to 8 19:13:53 executing program 1: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x6, 0xffffffffffffffff, 0x0) [ 333.578554][T17260] loop4: detected capacity change from 0 to 8 [ 333.578659][T17257] Can't find a SQUASHFS superblock on loop3 19:13:53 executing program 0: syz_open_dev$rtc(&(0x7f0000000040), 0xffffffffffffffff, 0x0) 19:13:53 executing program 1: r0 = socket(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x894c, 0x0) [ 333.649183][T17265] loop5: detected capacity change from 0 to 8 [ 333.667421][T17260] unable to read fragment index table 19:13:53 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) [ 333.767801][T17265] SQUASHFS error: zstd decompression error: 2 [ 333.789802][T17265] SQUASHFS error: zstd decompression failed, data probably corrupt [ 333.814325][T17265] SQUASHFS error: Failed to read block 0x108: -5 [ 333.844401][T17265] SQUASHFS error: Unable to read metadata cache entry [106] [ 333.854914][T17275] loop3: detected capacity change from 0 to 8 [ 333.873452][T17265] SQUASHFS error: Unable to read inode 0x11e [ 333.908394][T17275] Can't find a SQUASHFS superblock on loop3 19:13:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) 19:13:54 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x5450, 0x0) 19:13:54 executing program 1: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x2000, 0x103) keyctl$get_persistent(0x4, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 19:13:54 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) 19:13:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 334.441948][T17293] loop3: detected capacity change from 0 to 8 [ 334.447865][T17294] loop5: detected capacity change from 0 to 8 [ 334.457513][T17295] loop4: detected capacity change from 0 to 8 [ 334.484580][T17294] SQUASHFS error: zstd decompression error: 2 19:13:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) accept$packet(r0, 0x0, 0x0) 19:13:54 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x9000, &(0x7f0000000340)) [ 334.527601][T17293] Can't find a SQUASHFS superblock on loop3 [ 334.531364][T17294] SQUASHFS error: zstd decompression failed, data probably corrupt [ 334.562327][T17295] unable to read fragment index table 19:13:54 executing program 1: keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000940)={0x54, 0x14, 0x1, 0x0, 0x0, "", [@nested={0x20, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}]}, @typed={0xd, 0x0, 0x0, 0x0, @str='@-#-}&@!\x00'}, @generic="2ebe82671a512be9652d1edeed01156de0"]}, 0x54}], 0x1}, 0x0) [ 334.574734][T17294] SQUASHFS error: Failed to read block 0x108: -5 [ 334.595887][T17294] SQUASHFS error: Unable to read metadata cache entry [106] 19:13:54 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) 19:13:54 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 19:13:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) [ 334.648372][T17294] SQUASHFS error: Unable to read inode 0x11e [ 334.707724][T17308] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 334.720766][T17309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 19:13:54 executing program 2: request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='[%\f\xee.].\x00', 0x0) 19:13:54 executing program 1: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, 0x0) 19:13:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 334.798255][T17315] loop4: detected capacity change from 0 to 8 [ 334.809212][T17316] loop3: detected capacity change from 0 to 8 [ 334.847741][T17316] Can't find a SQUASHFS superblock on loop3 [ 334.872772][T17315] unable to read fragment index table 19:13:54 executing program 2: r0 = socket(0x26, 0x5, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 19:13:54 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) [ 334.955523][T17326] loop5: detected capacity change from 0 to 8 19:13:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 335.033978][T17326] SQUASHFS error: zstd decompression error: 2 [ 335.071302][T17326] SQUASHFS error: zstd decompression failed, data probably corrupt 19:13:54 executing program 1: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x5f}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, 0x0) [ 335.097828][T17335] loop3: detected capacity change from 0 to 8 [ 335.107105][T17326] SQUASHFS error: Failed to read block 0x108: -5 [ 335.130697][T17326] SQUASHFS error: Unable to read metadata cache entry [106] 19:13:54 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0xfffffffffffffe61}) [ 335.144400][T17335] Can't find a SQUASHFS superblock on loop3 [ 335.162050][T17326] SQUASHFS error: Unable to read inode 0x11e [ 335.180065][T17337] loop4: detected capacity change from 0 to 8 19:13:55 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x178}], 0x0, &(0x7f0000010300)) 19:13:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 335.269868][T17337] unable to read fragment index table [ 335.339866][T17349] loop3: detected capacity change from 0 to 8 [ 335.374026][T17349] unable to read xattr id index table [ 335.416349][T17354] loop5: detected capacity change from 0 to 8 [ 335.462178][T17354] SQUASHFS error: zstd decompression error: 2 [ 335.482110][T17354] SQUASHFS error: zstd decompression failed, data probably corrupt [ 335.494177][T17354] SQUASHFS error: Failed to read block 0x108: -5 [ 335.501454][T17354] SQUASHFS error: Unable to read metadata cache entry [106] [ 335.508874][T17354] SQUASHFS error: Unable to read inode 0x11e 19:13:55 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 19:13:55 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe8, 0x13, 0x1, 0x0, 0x0, {{'morus640-sse2\x00'}}, [{0x3}]}, 0xe8}}, 0x0) 19:13:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:55 executing program 1: socketpair(0x2, 0x2, 0x0, &(0x7f0000001600)) 19:13:55 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x178}], 0x0, &(0x7f0000010300)) 19:13:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) [ 335.674741][T17369] loop5: detected capacity change from 0 to 8 [ 335.674777][T17368] loop4: detected capacity change from 0 to 8 [ 335.704688][T17369] SQUASHFS error: zstd decompression error: 2 [ 335.705763][T17372] loop3: detected capacity change from 0 to 8 19:13:55 executing program 1: r0 = fsopen(&(0x7f0000000080)='cpuset\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x8) [ 335.711705][T17369] SQUASHFS error: zstd decompression failed, data probably corrupt [ 335.723738][T17375] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 335.729419][T17369] SQUASHFS error: Failed to read block 0x108: -5 [ 335.757978][T17369] SQUASHFS error: Unable to read metadata cache entry [106] [ 335.778943][T17369] SQUASHFS error: Unable to read inode 0x11e [ 335.793454][T17372] unable to read xattr id index table [ 335.815254][T17380] new mount options do not match the existing superblock, will be ignored [ 335.816687][T17368] unable to read fragment index table 19:13:55 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@get={0xe8, 0x13, 0x1, 0x0, 0x0, {{'morus640-sse2\x00'}}, [{0x3}]}, 0xe8}}, 0x0) 19:13:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 335.860842][T17380] new mount options do not match the existing superblock, will be ignored 19:13:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:55 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x178}], 0x0, &(0x7f0000010300)) 19:13:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, 0x0, 0x0) [ 335.974321][T17387] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 336.040445][T17390] loop5: detected capacity change from 0 to 8 [ 336.060736][T17395] loop3: detected capacity change from 0 to 8 [ 336.078979][T17397] loop4: detected capacity change from 0 to 8 [ 336.092090][T17395] unable to read xattr id index table [ 336.096816][T17390] SQUASHFS error: zstd decompression error: 2 [ 336.110149][T17390] SQUASHFS error: zstd decompression failed, data probably corrupt [ 336.122592][T17390] SQUASHFS error: Failed to read block 0x108: -5 [ 336.158005][T17390] SQUASHFS error: Unable to read metadata cache entry [106] [ 336.175667][T17390] SQUASHFS error: Unable to read inode 0x11e 19:13:56 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 19:13:56 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9205, 0x0) 19:13:56 executing program 1: keyctl$get_persistent(0xc, 0xffffffffffffffff, 0x0) 19:13:56 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x234}], 0x0, &(0x7f0000010300)) 19:13:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:56 executing program 1: keyctl$get_persistent(0x19, 0xffffffffffffffff, 0x0) 19:13:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={[{@fat=@gid={'gid', 0x3d, 0xee01}}]}) [ 336.656541][T17415] loop5: detected capacity change from 0 to 8 [ 336.670151][T17417] loop3: detected capacity change from 0 to 8 [ 336.676618][T17416] loop4: detected capacity change from 0 to 8 [ 336.741271][T17415] SQUASHFS error: zstd decompression error: 2 [ 336.748994][T17417] unable to read xattr id index table [ 336.769156][T17415] SQUASHFS error: zstd decompression failed, data probably corrupt 19:13:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 336.815130][T17415] SQUASHFS error: Failed to read block 0x108: -5 19:13:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @broadcast}, @l2tp={0x2, 0x0, @multicast2}, @llc, 0x1f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='erspan0\x00'}) 19:13:56 executing program 1: keyctl$get_persistent(0xf, 0xffffffffffffffff, 0x0) 19:13:56 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x234}], 0x0, &(0x7f0000010300)) [ 336.866980][T17415] SQUASHFS error: Unable to read metadata cache entry [106] [ 336.900051][T17415] SQUASHFS error: Unable to read inode 0x11e [ 336.968783][T17431] loop4: detected capacity change from 0 to 8 [ 337.077706][T17438] loop3: detected capacity change from 0 to 8 [ 337.109675][T17438] unable to read xattr id index table 19:13:57 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 19:13:57 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffc, 0x0) 19:13:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:57 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x40000140) 19:13:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:57 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x234}], 0x0, &(0x7f0000010300)) [ 337.581684][T17450] loop3: detected capacity change from 0 to 8 [ 337.593513][T17452] loop4: detected capacity change from 0 to 8 [ 337.595189][T17453] loop5: detected capacity change from 0 to 8 19:13:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 337.643893][T17450] unable to read xattr id index table 19:13:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)={[{@fat=@errors_remount}]}) 19:13:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0xc0481273, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 337.789233][T17453] SQUASHFS error: zstd decompression error: 2 [ 337.798594][T17453] SQUASHFS error: zstd decompression failed, data probably corrupt [ 337.808414][T17462] loop4: detected capacity change from 0 to 8 19:13:57 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x292}], 0x0, &(0x7f0000010300)) [ 337.830896][T17453] SQUASHFS error: Failed to read block 0x108: -5 [ 337.855066][T17453] SQUASHFS error: Unable to read metadata cache entry [106] 19:13:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 337.898571][T17453] SQUASHFS error: Unable to read inode 0x11e 19:13:57 executing program 2: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/clear_refs\x00', 0x300, 0x0) [ 338.002380][T17473] loop3: detected capacity change from 0 to 8 [ 338.068413][T17478] loop4: detected capacity change from 0 to 8 [ 338.070353][T17473] unable to read xattr id index table 19:13:58 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 19:13:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x68, &(0x7f0000000000)=0x7fffffff, 0x4) 19:13:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:58 executing program 2: syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x2000000, &(0x7f0000000380), 0x0, &(0x7f00000003c0)={[{@fat=@dos1xfloppy}, {@fat=@codepage={'codepage', 0x3d, '861'}}]}) 19:13:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:58 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805c", 0x292}], 0x0, &(0x7f0000010300)) [ 338.622894][T17492] loop5: detected capacity change from 0 to 8 [ 338.648002][T17496] loop3: detected capacity change from 0 to 8 [ 338.659466][T17494] loop4: detected capacity change from 0 to 1 19:13:58 executing program 1: pipe2(&(0x7f0000000e40), 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f0000000040)={0x8}, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) 19:13:58 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) [ 338.728848][T17492] SQUASHFS error: zstd decompression error: 2 [ 338.739136][T17494] attempt to access beyond end of device [ 338.739136][T17494] loop4: rw=2048, want=8, limit=1 [ 338.777314][T17496] unable to read xattr id index table [ 338.779531][T17492] SQUASHFS error: zstd decompression failed, data probably corrupt [ 338.810714][T17494] SQUASHFS error: Failed to read block 0x0: -5 [ 338.839232][T17492] SQUASHFS error: Failed to read block 0x108: -5 [ 338.854820][T17494] unable to read squashfs_super_block [ 338.873317][T17492] SQUASHFS error: Unable to read metadata cache entry [106] 19:13:58 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x292}], 0x0, &(0x7f0000010300)) [ 338.890309][T17492] SQUASHFS error: Unable to read inode 0x11e 19:13:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:58 executing program 1: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/mm/ksm/run\x00', 0x300, 0x0) 19:13:58 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 19:13:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 339.111801][T17511] loop4: detected capacity change from 0 to 1 [ 339.127496][T17512] loop3: detected capacity change from 0 to 8 [ 339.154810][T17511] attempt to access beyond end of device [ 339.154810][T17511] loop4: rw=2048, want=8, limit=1 [ 339.190017][T17512] unable to read xattr id index table [ 339.198280][T17511] SQUASHFS error: Failed to read block 0x0: -5 19:13:59 executing program 0: ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) 19:13:59 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0x40049409, 0x0) [ 339.238402][T17518] loop5: detected capacity change from 0 to 8 [ 339.239444][T17511] unable to read squashfs_super_block [ 339.392416][T17518] SQUASHFS error: zstd decompression error: 2 [ 339.425627][T17518] SQUASHFS error: zstd decompression failed, data probably corrupt [ 339.448676][T17518] SQUASHFS error: Failed to read block 0x108: -5 [ 339.463157][T17518] SQUASHFS error: Unable to read metadata cache entry [106] [ 339.482384][T17518] SQUASHFS error: Unable to read inode 0x11e 19:13:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000002580)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000002340)="7e4b4ebcec270581182898051b50446bbb", 0x0, 0x0, 0x0, 0x0, 0x0}) 19:13:59 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2c1}], 0x0, &(0x7f0000010300)) 19:13:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:13:59 executing program 0: ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) 19:13:59 executing program 1: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x3f00) 19:13:59 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 339.672321][T17537] loop3: detected capacity change from 0 to 8 [ 339.687001][T17538] loop4: detected capacity change from 0 to 1 19:13:59 executing program 1: keyctl$get_persistent(0x2, 0xee01, 0x0) 19:13:59 executing program 0: ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) [ 339.776956][T17538] attempt to access beyond end of device [ 339.776956][T17538] loop4: rw=2048, want=8, limit=1 [ 339.776992][T17544] loop5: detected capacity change from 0 to 8 [ 339.796490][T17537] unable to read xattr id index table 19:13:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x1f, 0xaf6, 0xa95}, 0x40) [ 339.879629][T17538] SQUASHFS error: Failed to read block 0x0: -5 [ 339.914301][T17544] SQUASHFS error: zstd decompression error: 2 19:13:59 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2c1}], 0x0, &(0x7f0000010300)) [ 339.928992][T17538] unable to read squashfs_super_block 19:13:59 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) [ 339.956926][T17544] SQUASHFS error: zstd decompression failed, data probably corrupt [ 339.997016][T17544] SQUASHFS error: Failed to read block 0x108: -5 19:13:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x17, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:13:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) [ 340.030755][T17544] SQUASHFS error: Unable to read metadata cache entry [106] [ 340.060378][T17544] SQUASHFS error: Unable to read inode 0x11e [ 340.081093][T17554] loop3: detected capacity change from 0 to 8 19:13:59 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 340.157869][T17554] unable to read xattr id index table 19:14:00 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 19:14:00 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2c1}], 0x0, &(0x7f0000010300)) 19:14:00 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 19:14:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) [ 340.370085][T17568] loop5: detected capacity change from 0 to 8 19:14:00 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) [ 340.448794][T17574] loop3: detected capacity change from 0 to 8 [ 340.487266][T17568] SQUASHFS error: zstd decompression error: 2 [ 340.518312][T17568] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x2, &(0x7f0000000500)=@raw=[@call, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f0000000540)='GPL\x00', 0x7, 0xbe, &(0x7f0000000580)=""/190, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 340.562480][T17568] SQUASHFS error: Failed to read block 0x108: -5 [ 340.582175][T17574] unable to read xattr id index table 19:14:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xa, 0x8, 0xf902, 0x101, 0x0, 0x1}, 0x40) 19:14:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) 19:14:00 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) [ 340.618125][T17568] SQUASHFS error: Unable to read metadata cache entry [106] [ 340.651304][T17568] SQUASHFS error: Unable to read inode 0x11e 19:14:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040)=0x200000, 0x4) 19:14:00 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 19:14:00 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:14:00 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2d8}], 0x0, &(0x7f0000010300)) 19:14:00 executing program 1: r0 = socket(0x2, 0x3, 0x40) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 19:14:00 executing program 2: r0 = socket(0x2, 0x3, 0x6) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x4000000) 19:14:00 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) [ 341.044999][T17599] loop4: detected capacity change from 0 to 8 19:14:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000480)=@nfc, 0x80) [ 341.087650][T17599] Can't find a SQUASHFS superblock on loop4 [ 341.101852][T17605] loop5: detected capacity change from 0 to 8 19:14:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) [ 341.134875][T17606] loop3: detected capacity change from 0 to 8 [ 341.186502][T17605] SQUASHFS error: zstd decompression error: 2 [ 341.210253][T17605] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f0000000180)='wg0\x00', 0x4) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f00000000c0)) getpeername(r3, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x80) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6tnl0\x00', r4, 0x4, 0x8, 0xff, 0x5, 0x45, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, 0x8, 0x8, 0x2, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000740)={'syztnl1\x00', &(0x7f00000006c0)={'syztnl0\x00', r4, 0x2f, 0x1, 0x78, 0x6, 0x4, @dev={0xfe, 0x80, '\x00', 0x27}, @ipv4={'\x00', '\xff\xff', @remote}, 0x40, 0x8000, 0x40}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000800)={'ip6gre0\x00', &(0x7f0000000780)={'sit0\x00', r4, 0x2f, 0x9, 0x7, 0x1, 0x40, @empty, @loopback, 0x8000, 0x700}}) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r7, 0x8982, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000980)=@nat={'nat\x00', 0x1b, 0x5, 0x660, 0x0, 0x280, 0xffffffff, 0x280, 0x3e0, 0x590, 0x590, 0xffffffff, 0x590, 0x590, 0x5, &(0x7f0000000900), {[{{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ipv6header={{0x28}, {0xca, 0x22}}, @common=@hl={{0x28}, {0x0, 0x64}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x3, @ipv4=@private=0xa010100, @ipv4=@multicast2, @port=0x4e20, @port=0x4e22}}}, {{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@icmp6={{0x28}, {0x8, "e6da", 0x1}}, @common=@mh={{0x28}, {"81dd"}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv6=@private0, @ipv4=@remote, @icmp_id=0x64, @icmp_id=0x67}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@hl={{0x28}, {0x1, 0x3}}, @common=@unspec=@helper={{0x48}, {0x1, 'snmp\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv4=@multicast1, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port=0x4e21, @port=0x4e21}}}, {{@uncond, 0x0, 0x168, 0x1b0, 0x0, {}, [@common=@srh={{0x30}, {0x2f, 0x46, 0x6, 0x60, 0x7, 0x20, 0xa00}}, @common=@srh1={{0x90}, {0x1d, 0x77, 0x40, 0x3f, 0x71, @mcast2, @rand_addr=' \x01\x00', @local, [0xffffffff, 0x0, 0xffffff00, 0xffffff00], [0xffffff00, 0x0, 0xff000000, 0xffffffff], [0x0, 0xff000000, 0xffffffff, 0xffffffff], 0x8aa, 0x14}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x9, @ipv4=@multicast2, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id=0x66, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6c0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="18280000e9ffffffffffffff00110000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0xf, 0x10000, 0x3}, 0x10}, 0x78) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000480)={'tunl0\x00', &(0x7f0000000400)={'ip_vti0\x00', r6, 0x700, 0x10, 0x3, 0x3, {{0x15, 0x4, 0x2, 0x3, 0x54, 0x67, 0x0, 0x79, 0x4, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x32}, {[@timestamp_prespec={0x44, 0x14, 0xd2, 0x3, 0xf, [{@rand_addr=0x64010102, 0x1d}, {@local}]}, @lsrr={0x83, 0x27, 0x53, [@dev={0xac, 0x14, 0x14, 0x44}, @remote, @multicast2, @private=0xa010101, @loopback, @broadcast, @loopback, @dev={0xac, 0x14, 0x14, 0x32}, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x3, 0x9d}]}}}}}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x626fde401932d42c}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x64, 0x0, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0xfffffffffffffdf0}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r8}, @FOU_ATTR_TYPE={0x5}]}, 0x64}}, 0x4048845) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', r4, 0x29, 0x1, 0x6e, 0x7, 0x69, @dev={0xfe, 0x80, '\x00', 0x14}, @local, 0x80, 0x20, 0xbe, 0x5}}) setsockopt$sock_int(r0, 0x300, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)=@gettclass={0x24, 0x2a, 0x400, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, r5, {0x10, 0xb}, {0xfff3, 0x9}, {0xa, 0x4}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x800) 19:14:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) [ 341.234007][T17605] SQUASHFS error: Failed to read block 0x108: -5 [ 341.238733][T17606] unable to read xattr id index table [ 341.268644][T17605] SQUASHFS error: Unable to read metadata cache entry [106] 19:14:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x16, &(0x7f0000000140)=ANY=[], 0x0) [ 341.320488][T17605] SQUASHFS error: Unable to read inode 0x11e 19:14:01 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2d8}], 0x0, &(0x7f0000010300)) [ 341.378955][T17617] loop4: detected capacity change from 0 to 8 [ 341.437926][T17617] Can't find a SQUASHFS superblock on loop4 19:14:01 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) [ 341.505709][T17625] x_tables: duplicate underflow at hook 1 19:14:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 19:14:01 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10}, 0x10}}, 0x0) [ 341.599035][T17631] loop5: detected capacity change from 0 to 8 [ 341.618750][T17632] loop3: detected capacity change from 0 to 8 19:14:01 executing program 2: syz_emit_ethernet(0x2e, &(0x7f00000001c0)={@empty, @remote, @val={@void}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @empty, @multicast2}, @info_request}}}}, 0x0) [ 341.714552][T17640] loop4: detected capacity change from 0 to 8 [ 341.725081][T17631] SQUASHFS error: zstd decompression error: 2 [ 341.744901][T17632] unable to read xattr id index table [ 341.761039][T17631] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x0, 0x1000}, 0x40) 19:14:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) [ 341.793945][T17640] Can't find a SQUASHFS superblock on loop4 [ 341.804953][T17631] SQUASHFS error: Failed to read block 0x108: -5 19:14:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) [ 341.851687][T17631] SQUASHFS error: Unable to read metadata cache entry [106] [ 341.888080][T17631] SQUASHFS error: Unable to read inode 0x11e 19:14:01 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000200)=@raw=[@map_val], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 19:14:01 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f0200000000000028800000060078617474723106000000786174747231000006007861747472320600000078617474723210800000000000000000020000", 0x2d8}], 0x0, &(0x7f0000010300)) 19:14:01 executing program 1: mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x9cf59494fa3a47bf, 0xffffffffffffffff, 0x0) 19:14:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) 19:14:01 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x13, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 342.106777][T17659] loop4: detected capacity change from 0 to 8 [ 342.129255][T17660] loop3: detected capacity change from 0 to 8 [ 342.169481][T17659] Can't find a SQUASHFS superblock on loop4 19:14:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8901, &(0x7f0000000000)={'veth0_to_bond\x00', @ifru_hwaddr=@dev}) 19:14:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:14:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001100)=@newtfilter={0xec4, 0x2c, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_route={{0xa}, {0xd10, 0x2, [@TCA_ROUTE4_POLICE={0x81c, 0x5, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, @TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_AVRATE={0x8}]}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_ACT={0x4d8, 0x6, [@m_mpls={0x58, 0x0, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}]}, {0x21, 0x6, "3548e670af3ff60723bbbcb11a65446d82f7461f7fa6a24bfac9c9dc61"}, {0xc}, {0xc}}}, @m_vlan={0x4c, 0x0, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_ID={0x6}]}, {0xd, 0x6, "8388e3415c2a9d6893"}, {0xc}, {0xc}}}, @m_bpf={0x1a8, 0x0, 0x0, 0x0, {{0x8}, {0x9c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{}, {}, {}, {}]}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0xe5, 0x6, "5be42b1fd57e17aab02624d76ba7e858e2769701c0cbd02285e2daf2bced8c2f362f2e697f7c03d76beda9c1f021d4ef3895c50158b2c8f62f59a80a0b921cf7c109cb822cc46317776261258f5f7d9449775f1d28fd0a1ee9836116c2a3e394e38cf9b8700dcf29b7d011c8a7ab87f7d7467824fc88ddb62089ea8ac28743bd28900d92a419735907c2458b045bbc7d849909d053179fc855704322990a12e8e4615171539f9df92b505bf32e47e861f1dae9ebf9ba91fca3357bdec3c6bc39d5a1eb3cdefae989124086e01073fca50bf507d14d25ea1be06b53cd3f12fd9092"}, {0xc}, {0xc}}}, @m_ctinfo={0x98, 0x0, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18}]}, {0x51, 0x6, "c1d82d75d481e805646c226f7f7ffde7d498b90aeec2c068a0bb2f226da268410001d5fc21acbbbfbfc87c4d12e50117d0eba8cd56a4a4cfdef30e4a62504c559fb708fcf5f2b63d5dde8aa39f"}, {0xc}, {0xc}}}, @m_xt={0x10c, 0x0, 0x0, 0x0, {{0x7}, {0x98, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x91, 0x6, {0x0, 'raw\x00', 0x0, 0x0, "01a20caceddcdfbd7a48a0c729158998c60047066878b48ca4fb098d548320e2907622a09780fb66354148cdcc03173f09c666a28ce9abb9e5eafc2b95e4a29c632b94ff80998657a3768ffc1d372e5371ed26dc4575b93664a342be52daa8e5e948b2bf0db73a"}}]}, {0x4d, 0x6, "a61f4f76ec9aec01282aa408419eb71e125b7722cb258c38c9b4fd983b390b1b733eb1e593d4f58317134e8d78e759aab1fc21f91763a818aaf2e413a5cde7f2718ba84860915c0d2a"}, {0xc}, {0xc}}}, @m_tunnel_key={0xe4, 0x0, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}]}, {0x8d, 0x6, "966e741f9de50a55326c4288e39f8945d30ac43531113d05dae16b23e93801ba4539a292e34a9793b9216ba1116b5a215ad1d4d20daabfd3e82550759f3f98a772c34656c02c4561cbda1721b765b17306ecb8715f415aab140b77c5c3c6549b80fe1fb5cb4686c8a0b177e844134a49612dc2614a5710002dcdd8785f882212a466b5cc34b6050d93"}, {0xc}, {0xc}}}]}, @TCA_ROUTE4_FROM={0x8}]}}, @filter_kind_options=@f_bpf={{0x8}, {0x48, 0x2, [@TCA_BPF_CLASSID={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_FD={0x8}]}}, @filter_kind_options=@f_matchall={{0xd}, {0x124, 0x2, [@TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0xcc, 0x2, [@m_mpls={0xc8, 0x0, 0x0, 0x0, {{0x9}, {0x64, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_PROTO={0x6}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5}]}, {0x39, 0x6, "e43dfe5ca8c8ef0b831bede51ce01bd4ac17d72d2c793366ff7332ced1afb4e2631942b449800de9bb2fdaa0931ee6c014ac9ce070"}, {0xc}, {0xc}}}]}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0x34, 0x2, [@m_skbmod={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0xec4}}, 0x0) [ 342.274115][T17660] unable to read xattr id index table [ 342.308296][T17671] loop5: detected capacity change from 0 to 8 19:14:02 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) 19:14:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x891d, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) [ 342.382367][T17671] SQUASHFS error: zstd decompression error: 2 [ 342.390734][T17671] SQUASHFS error: zstd decompression failed, data probably corrupt [ 342.395050][T17678] loop4: detected capacity change from 0 to 8 [ 342.419356][T17671] SQUASHFS error: Failed to read block 0x108: -5 19:14:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xa, 0x8, 0x4, 0x101, 0xa, 0x1}, 0x40) [ 342.454078][T17678] Can't find a SQUASHFS superblock on loop4 [ 342.471294][T17671] SQUASHFS error: Unable to read metadata cache entry [106] [ 342.494047][T17671] SQUASHFS error: Unable to read inode 0x11e 19:14:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:14:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f00000014c0)={&(0x7f00000013c0), 0xc, &(0x7f0000001480)={0x0}}, 0x0) [ 342.545070][T17688] loop3: detected capacity change from 0 to 8 19:14:02 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 342.625416][T17688] unable to read xattr id index table [ 342.639710][T17694] loop4: detected capacity change from 0 to 8 [ 342.694384][T17694] Can't find a SQUASHFS superblock on loop4 [ 342.723215][T17700] loop5: detected capacity change from 0 to 8 [ 342.798614][T17700] SQUASHFS error: zstd decompression error: 2 [ 342.804900][T17700] SQUASHFS error: zstd decompression failed, data probably corrupt [ 342.815776][T17700] SQUASHFS error: Failed to read block 0x108: -5 [ 342.822937][T17700] SQUASHFS error: Unable to read metadata cache entry [106] [ 342.831813][T17700] SQUASHFS error: Unable to read inode 0x11e 19:14:02 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) 19:14:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=@deltfilter={0x23, 0x2d, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) 19:14:02 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) 19:14:02 executing program 1: r0 = epoll_create(0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) 19:14:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) 19:14:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) [ 343.172583][T17714] loop4: detected capacity change from 0 to 8 [ 343.200099][T17717] loop3: detected capacity change from 0 to 8 19:14:03 executing program 1: mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 19:14:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 343.235337][T17714] Can't find a SQUASHFS superblock on loop4 19:14:03 executing program 2: syz_emit_ethernet(0x15d, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa02ffffffffffff0800cce4014f006600006b2f9078ffffffff0a010101831bd00a010100e0000002e00047080a010102ac1e0101ffffffff000c21880b"], 0x0) 19:14:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) [ 343.334142][T17717] unable to read xattr id index table 19:14:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:03 executing program 1: socket$xdp(0x2c, 0x3, 0x0) socketpair(0x0, 0x0, 0x7fffffff, &(0x7f0000000000)) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x31, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 343.523844][T17734] loop4: detected capacity change from 0 to 8 [ 343.564129][T17734] Can't find a SQUASHFS superblock on loop4 19:14:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000007580)=[{{&(0x7f0000001480)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "a064dde1792d6441472930664cf6c821b64d8e0b45602f2e5f4a111069a293a47836b056dbf5ab7e60b1a4d6977951fe87a8e4445d6cdabb4ead21fd8e5b6e"}, 0x80, &(0x7f0000002c40)=[{0x0}, {0x0}, {&(0x7f00000011c0)='J', 0x1}], 0x3}}], 0x1, 0x0) 19:14:03 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000240)={0x0, 0x0}) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) 19:14:03 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) 19:14:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0x50}}, 0x0) 19:14:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) [ 344.170065][T17752] loop5: detected capacity change from 0 to 8 [ 344.173458][T17754] loop3: detected capacity change from 0 to 8 19:14:04 executing program 1: syz_emit_ethernet(0x43b, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd65ad237704"], 0x0) 19:14:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x1d, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 344.219262][T17756] loop4: detected capacity change from 0 to 8 [ 344.253557][T17754] unable to read xattr id index table [ 344.308065][T17756] Can't find a SQUASHFS superblock on loop4 [ 344.317076][T17752] SQUASHFS error: zstd decompression error: 2 [ 344.339865][T17752] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:04 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ea}], 0x0, &(0x7f0000010300)) [ 344.362584][T17752] SQUASHFS error: Failed to read block 0x108: -5 19:14:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x178}], 0x0, &(0x7f0000010300)) 19:14:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000040)={'sit0\x00', 0x0}) [ 344.413232][T17752] SQUASHFS error: Unable to read metadata cache entry [106] [ 344.432518][T17752] SQUASHFS error: Unable to read inode 0x11e 19:14:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x1, 0x0, 0xc9, 0x0, 0x1}, 0x40) [ 344.520885][T17771] loop4: detected capacity change from 0 to 8 [ 344.529172][T17772] loop3: detected capacity change from 0 to 8 19:14:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x9}, 0x40) [ 344.565588][T17771] unable to read xattr id index table [ 344.623422][T17772] unable to read xattr id index table 19:14:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x178}], 0x0, &(0x7f0000010300)) 19:14:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8982, &(0x7f0000000000)={'veth0_to_bond\x00', @ifru_hwaddr=@dev}) 19:14:04 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x12, 0x1, &(0x7f00000002c0)=@raw=[@jmp], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:04 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ea}], 0x0, &(0x7f0000010300)) 19:14:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000180)={'ip_vti0\x00', 0x0}) [ 345.168108][T17792] loop5: detected capacity change from 0 to 8 [ 345.208904][T17795] loop3: detected capacity change from 0 to 8 [ 345.209261][T17793] loop4: detected capacity change from 0 to 8 19:14:05 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x178, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x148, 0x2, [@TCA_GRED_PARMS={0x38}, @TCA_GRED_STAB={0x104, 0x2, "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"}, @TCA_GRED_LIMIT={0x8, 0x6, 0x5}]}}]}, 0x178}}, 0x0) 19:14:05 executing program 1: syz_emit_ethernet(0x86, &(0x7f0000000180)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "2b8cef2bc9b0c5de93bbbd54f41b1866f36146a9f333b3ff93a9cc88bb822db8", "430e00b7ecdc01937865ee9d65b94754", {"a0b9aa038fbd0f75f25dc15f8183480f", "c1077f456595c08c924defa3ceb1c2fe"}}}}}}}, 0x0) 19:14:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x8970, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 345.277990][T17792] SQUASHFS error: zstd decompression error: 2 [ 345.306475][T17792] SQUASHFS error: zstd decompression failed, data probably corrupt [ 345.319163][T17795] unable to read xattr id index table [ 345.356207][T17793] unable to read xattr id index table [ 345.365615][T17792] SQUASHFS error: Failed to read block 0x108: -5 19:14:05 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ea}], 0x0, &(0x7f0000010300)) [ 345.405182][T17792] SQUASHFS error: Unable to read metadata cache entry [106] [ 345.438996][T17792] SQUASHFS error: Unable to read inode 0x11e 19:14:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x178}], 0x0, &(0x7f0000010300)) 19:14:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb803, &(0x7f0000000140)=@framed={{}, [@generic]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) 19:14:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x5452, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) [ 345.640739][T17816] loop3: detected capacity change from 0 to 8 [ 345.652070][T17817] loop4: detected capacity change from 0 to 8 19:14:05 executing program 0: syz_emit_ethernet(0x43b, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd65ad237704052f"], 0x0) [ 345.717797][T17816] unable to read xattr id index table [ 345.728513][T17817] unable to read xattr id index table [ 345.765833][T17824] loop5: detected capacity change from 0 to 8 19:14:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x234}], 0x0, &(0x7f0000010300)) 19:14:05 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ed}], 0x0, &(0x7f0000010300)) [ 345.847542][T17824] SQUASHFS error: zstd decompression error: 2 [ 345.884786][T17824] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:05 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001740)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x2000001c}) [ 345.929038][T17824] SQUASHFS error: Failed to read block 0x108: -5 [ 345.950277][T17824] SQUASHFS error: Unable to read metadata cache entry [106] 19:14:05 executing program 0: pipe(&(0x7f0000000040)) r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x13, r0, 0x0) 19:14:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89b0, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local}}}}) [ 345.988244][T17824] SQUASHFS error: Unable to read inode 0x11e [ 346.029627][T17836] loop4: detected capacity change from 0 to 8 [ 346.067694][T17836] unable to read xattr id index table [ 346.085274][T17842] loop3: detected capacity change from 0 to 8 19:14:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8943, &(0x7f0000000180)={'ip_vti0\x00', 0x0}) 19:14:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000040)={'vlan0\x00', @ifru_hwaddr=@dev}) 19:14:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x234}], 0x0, &(0x7f0000010300)) [ 346.203182][T17842] unable to read xattr id index table 19:14:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 19:14:06 executing program 0: syz_emit_ethernet(0xb658, 0x0, 0x0) 19:14:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ed}], 0x0, &(0x7f0000010300)) 19:14:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x12, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 346.395780][T17861] loop5: detected capacity change from 0 to 8 [ 346.405845][T17865] loop4: detected capacity change from 0 to 8 [ 346.451888][T17861] SQUASHFS error: zstd decompression error: 2 [ 346.471035][T17865] unable to read xattr id index table [ 346.479312][T17861] SQUASHFS error: zstd decompression failed, data probably corrupt [ 346.489790][T17874] loop3: detected capacity change from 0 to 8 19:14:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=@deltfilter={0x24, 0x2d, 0x1}, 0x24}}, 0x0) 19:14:06 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffc}], &(0x7f0000000040)='GPL\x00', 0x6, 0x8c, &(0x7f00000001c0)=""/140, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 346.500669][T17861] SQUASHFS error: Failed to read block 0x108: -5 [ 346.514213][T17861] SQUASHFS error: Unable to read metadata cache entry [106] 19:14:06 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x170, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x140, 0x2, [@TCA_GRED_PARMS={0x38, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, @TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x170}}, 0x0) [ 346.558883][T17861] SQUASHFS error: Unable to read inode 0x11e [ 346.577167][T17874] unable to read xattr id index table 19:14:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x234}], 0x0, &(0x7f0000010300)) 19:14:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000", 0x2ed}], 0x0, &(0x7f0000010300)) 19:14:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'veth0_to_bond\x00', @ifru_hwaddr=@dev}) 19:14:06 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000001000)=0x200000, 0x4) [ 346.758769][T17888] loop4: detected capacity change from 0 to 8 19:14:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 346.827190][T17895] loop5: detected capacity change from 0 to 8 [ 346.834740][T17888] unable to read xattr id index table [ 346.852839][T17897] veth0_to_bond: mtu less than device minimum [ 346.858486][T17899] loop3: detected capacity change from 0 to 8 19:14:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x8931, &(0x7f0000000080)={'sit0\x00', 0x0}) 19:14:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x0, 0x81}, 0x40) [ 346.920126][T17899] unable to read xattr id index table [ 346.929211][T17895] SQUASHFS error: zstd decompression error: 2 [ 346.959290][T17895] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x292}], 0x0, &(0x7f0000010300)) [ 346.984039][T17895] SQUASHFS error: Failed to read block 0x108: -5 [ 347.009934][T17895] SQUASHFS error: Unable to read metadata cache entry [106] 19:14:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb", 0x2ee}], 0x0, &(0x7f0000010300)) 19:14:06 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001740)={0x64000000}) [ 347.070309][T17895] SQUASHFS error: Unable to read inode 0x11e 19:14:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8947, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 19:14:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(r0, &(0x7f0000000040)=@generic={0x27, "b4bcb99df991ad79590030bae19fdccaedf21fe3ad192940196cadff0f5d2304060cac10489342a062331d499734406020c4855cd2e10bec1f33a206f77b77d85c586e6b61a8debd66320590d9a2593767d46a8dc504e696da9e57bca01e388b306de21be84fa4741497d2473c0fae230735195794e1e36d5ef0273606dd"}, 0x80) [ 347.151099][T17913] loop4: detected capacity change from 0 to 8 [ 347.190990][T17917] loop3: detected capacity change from 0 to 8 19:14:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:07 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x894c, 0x0) [ 347.248657][T17917] unable to read xattr id index table [ 347.287059][T17913] unable to read xattr id index table 19:14:07 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x90) 19:14:07 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ee}], 0x0, &(0x7f0000010300)) 19:14:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805c", 0x292}], 0x0, &(0x7f0000010300)) 19:14:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000140)=@framed={{}, [@generic={0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:07 executing program 1: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@empty, @dev, @void, {@ipv4={0x800, @udp={{0x10, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @local, {[@end, @rr={0x7, 0x17, 0x0, [@private, @multicast1, @multicast2, @loopback, @loopback]}, @cipso={0x86, 0xe, 0x0, [{0x0, 0x8, "a19973913846"}]}, @lsrr={0x83, 0x3}]}}, {0x0, 0x0, 0x18, 0x0, @wg=@data}}}}}, 0x0) [ 347.473547][T17941] loop5: detected capacity change from 0 to 8 19:14:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) [ 347.536988][T17948] loop3: detected capacity change from 0 to 8 [ 347.539135][T17946] loop4: detected capacity change from 0 to 8 [ 347.614315][T17941] SQUASHFS error: zstd decompression error: 2 [ 347.647785][T17946] unable to read xattr id index table [ 347.654549][T17941] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1b, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 347.669409][T17948] unable to read xattr id index table [ 347.692318][T17941] SQUASHFS error: Failed to read block 0x108: -5 19:14:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000140)=@framed={{}, [@generic={0x7}]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:07 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000480), &(0x7f0000000000)=0xfffffffffffffff8) 19:14:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805c", 0x292}], 0x0, &(0x7f0000010300)) [ 347.719899][T17941] SQUASHFS error: Unable to read metadata cache entry [106] [ 347.753566][T17941] SQUASHFS error: Unable to read inode 0x11e 19:14:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:07 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ee}], 0x0, &(0x7f0000010300)) 19:14:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x300, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', r1, 0x4, 0x2, 0x7f, 0x0, 0x12, @private2={0xfc, 0x2, '\x00', 0x1}, @private1, 0x700, 0x80, 0xefff, 0x977}}) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x140f, 0x10, 0x70bd27, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xb, 0x45, 'smc_ib\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xb, 0x45, 'smc_ib\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004060}, 0x40000) 19:14:07 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_int(r0, 0x300, 0x0, 0x0, 0x0) 19:14:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2}}, [], {0x14, 0x10}}, 0x28}}, 0x0) [ 347.969097][T17970] loop4: detected capacity change from 0 to 8 [ 347.994545][T17975] loop3: detected capacity change from 0 to 8 [ 348.038203][T17970] unable to read xattr id index table 19:14:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x102}, 0x40) [ 348.063289][T17980] loop5: detected capacity change from 0 to 8 [ 348.081047][T17975] unable to read xattr id index table 19:14:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8921, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 19:14:07 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) connect(r0, &(0x7f00000007c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80) 19:14:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2c1}], 0x0, &(0x7f0000010300)) [ 348.171294][T17980] SQUASHFS error: zstd decompression error: 2 [ 348.194078][T17980] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:08 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, 0x0) [ 348.230129][T17980] SQUASHFS error: Failed to read block 0x108: -5 19:14:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xf, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 348.272892][T17980] SQUASHFS error: Unable to read metadata cache entry [106] [ 348.306644][T17980] SQUASHFS error: Unable to read inode 0x11e 19:14:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x11, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 348.320547][T17994] loop4: detected capacity change from 0 to 8 [ 348.370895][T17999] loop3: detected capacity change from 0 to 8 [ 348.391219][T17994] unable to read xattr id index table 19:14:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f8, &(0x7f0000000080)={'sit0\x00', 0x0}) 19:14:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000040)={'sit0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 19:14:08 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) 19:14:08 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, 0x0) 19:14:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2c1}], 0x0, &(0x7f0000010300)) 19:14:08 executing program 0: syz_emit_ethernet(0x43b, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd65ad237704052f0020010000000000000000000000000000000000000000000000000000000000000202"], 0x0) 19:14:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000940)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xe6, &(0x7f0000000080)=""/230, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 348.595332][T18013] loop5: detected capacity change from 0 to 8 19:14:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'team0\x00', @ifru_ivalue}) [ 348.676487][T18013] SQUASHFS error: zstd decompression error: 2 [ 348.685272][T18021] loop3: detected capacity change from 0 to 8 [ 348.694230][T18013] SQUASHFS error: zstd decompression failed, data probably corrupt [ 348.703352][T18020] loop4: detected capacity change from 0 to 8 [ 348.724249][T18013] SQUASHFS error: Failed to read block 0x108: -5 19:14:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1d, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 348.750128][T18013] SQUASHFS error: Unable to read metadata cache entry [106] [ 348.768543][T18020] unable to read xattr id index table 19:14:08 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x8b0e0000, 0x1000}, 0x20) [ 348.815746][T18013] SQUASHFS error: Unable to read inode 0x11e 19:14:08 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, 0x0) 19:14:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2c1}], 0x0, &(0x7f0000010300)) 19:14:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000000)={'veth0_to_bond\x00', @ifru_hwaddr=@dev}) 19:14:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 349.019613][T18038] loop3: detected capacity change from 0 to 8 19:14:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x890d, 0x0) 19:14:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003100)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) [ 349.154502][T18046] loop5: detected capacity change from 0 to 8 [ 349.162746][T18047] loop4: detected capacity change from 0 to 8 19:14:09 executing program 0: socket$inet(0x2, 0x3, 0x1f) 19:14:09 executing program 3: r0 = socket(0x2, 0x3, 0x6) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) [ 349.254727][T18047] unable to read xattr id index table [ 349.264063][T18046] SQUASHFS error: zstd decompression error: 2 [ 349.282629][T18046] SQUASHFS error: zstd decompression failed, data probably corrupt [ 349.301103][T18046] SQUASHFS error: Failed to read block 0x108: -5 [ 349.312903][T18046] SQUASHFS error: Unable to read metadata cache entry [106] [ 349.325236][T18046] SQUASHFS error: Unable to read inode 0x11e 19:14:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2d8}], 0x0, &(0x7f0000010300)) 19:14:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x44, 0x6, 0x430, 0x98, 0x123, 0x0, 0x1e0, 0x130, 0x398, 0x398, 0x398, 0x398, 0x398, 0x6, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x1e0}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'vcan0\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@loopback}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'syzkaller0\x00', 'bond0\x00'}, 0x0, 0xc8, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@inet=@dccp={{0x30}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@dccp={{0x30}}]}, @common=@unspec=@NFQUEUE3={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) 19:14:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_int(r0, 0x1, 0x23, 0x0, &(0x7f0000000040)) 19:14:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_ife={0x38, 0x1, 0x0, 0x0, {{0x8}, {0x10, 0x2, 0x0, 0x1, [@TCA_IFE_DMAC={0xa, 0x3, @multicast}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x50}}, 0x0) 19:14:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000000040)=@newtaction={0x18, 0x31, 0x1, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) [ 349.525588][T18070] loop4: detected capacity change from 0 to 8 [ 349.530211][T18071] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING 19:14:09 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x30}, 0x10) 19:14:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f00000024c0)={0x0, 0x0, 0x0}, 0x40000102) [ 349.583988][T18070] unable to read xattr id index table [ 349.623546][T18076] loop5: detected capacity change from 0 to 8 19:14:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000080)=@framed={{}, [@generic, @alu, @call]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x81) 19:14:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f0200000000000028800000060078617474723106000000786174747231000006007861747472320600000078617474723210800000000000000000020000", 0x2d8}], 0x0, &(0x7f0000010300)) 19:14:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000002b00)={0x0, 0x2a}}, 0x0) [ 349.774165][T18076] SQUASHFS error: zstd decompression error: 2 19:14:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 349.819680][T18076] SQUASHFS error: zstd decompression failed, data probably corrupt [ 349.834791][T18087] loop4: detected capacity change from 0 to 8 [ 349.849376][T18076] SQUASHFS error: Failed to read block 0x108: -5 [ 349.861355][T18087] unable to read xattr id index table [ 349.878472][T18076] SQUASHFS error: Unable to read metadata cache entry [106] [ 349.897168][T18076] SQUASHFS error: Unable to read inode 0x11e 19:14:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x1, &(0x7f0000000500)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f0000000540)='GPL\x00', 0x7, 0xbe, &(0x7f0000000580)=""/190, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x890c, 0x0) 19:14:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f0200000000000028800000060078617474723106000000786174747231000006007861747472320600000078617474723210800000000000000000020000", 0x2d8}], 0x0, &(0x7f0000010300)) 19:14:09 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'geneve1\x00', {0x2, 0x0, @broadcast}}) 19:14:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, 0x0, 0x700) 19:14:09 executing program 0: r0 = socket(0x2, 0x3, 0x6) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x40000101) [ 350.176065][T18105] loop4: detected capacity change from 0 to 8 [ 350.195747][T18105] unable to read xattr id index table [ 350.226771][T18106] loop5: detected capacity change from 0 to 8 [ 350.302344][T18106] SQUASHFS error: zstd decompression error: 2 [ 350.308921][T18106] SQUASHFS error: zstd decompression failed, data probably corrupt [ 350.324744][T18106] SQUASHFS error: Failed to read block 0x108: -5 [ 350.362070][T18106] SQUASHFS error: Unable to read metadata cache entry [106] [ 350.419971][T18106] SQUASHFS error: Unable to read inode 0x11e 19:14:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xa, 0x8, 0xf103, 0x101, 0x0, 0x1}, 0x40) 19:14:10 executing program 3: syz_emit_ethernet(0x43b, &(0x7f0000000080)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd659c0bcf9ddce2"], 0x0) 19:14:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000000)={'veth0_to_bond\x00', @ifru_hwaddr=@dev}) 19:14:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) 19:14:10 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x178, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x148, 0x2, [@TCA_GRED_PARMS={0x38}, @TCA_GRED_STAB={0x104, 0x2, "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"}, @TCA_GRED_LIMIT={0x8, 0x6, 0x4}]}}]}, 0x178}}, 0x0) 19:14:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) [ 350.795252][T18127] loop4: detected capacity change from 0 to 8 [ 350.820355][T18128] loop5: detected capacity change from 0 to 8 19:14:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x4}) 19:14:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000040)={'veth0_to_batadv\x00', @ifru_map}) [ 350.866798][T18127] unable to read xattr id index table 19:14:10 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = socket$nl_rdma(0x10, 0x3, 0x14) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001740)) [ 350.940599][T18128] SQUASHFS error: zstd decompression error: 2 19:14:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000", 0x2e4}], 0x0, &(0x7f0000010300)) 19:14:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x22, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 350.983745][T18128] SQUASHFS error: zstd decompression failed, data probably corrupt [ 351.023372][T18128] SQUASHFS error: Failed to read block 0x108: -5 [ 351.060827][T18128] SQUASHFS error: Unable to read metadata cache entry [106] 19:14:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x8942, &(0x7f0000000080)={'sit0\x00', 0x0}) 19:14:10 executing program 1: r0 = socket(0x2, 0x3, 0x6) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) [ 351.105501][T18128] SQUASHFS error: Unable to read inode 0x11e [ 351.121221][T18147] loop4: detected capacity change from 0 to 8 19:14:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000140)=@framed={{}, [@generic={0x3f}]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 351.212879][T18147] unable to read xattr id index table 19:14:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x8932, &(0x7f0000000080)={'sit0\x00', 0x0}) 19:14:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000001100)=@newtfilter={0xec4, 0x2c, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_route={{0xa}, {0xd10, 0x2, [@TCA_ROUTE4_POLICE={0x81c, 0x5, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7866]}, @TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_AVRATE={0x8}]}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_ACT={0x4d8, 0x6, [@m_mpls={0x58, 0x0, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}]}, {0x21, 0x6, "3548e670af3ff60723bbbcb11a65446d82f7461f7fa6a24bfac9c9dc61"}, {0xc}, {0xc}}}, @m_vlan={0x4c, 0x0, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_ID={0x6}]}, {0xd, 0x6, "8388e3415c2a9d6893"}, {0xc}, {0xc}}}, @m_bpf={0x1a8, 0x0, 0x0, 0x0, {{0x8}, {0x9c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{}, {}, {}, {}]}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0xe5, 0x6, "5be42b1fd57e17aab02624d76ba7e858e2769701c0cbd02285e2daf2bced8c2f362f2e697f7c03d76beda9c1f021d4ef3895c50158b2c8f62f59a80a0b921cf7c109cb822cc46317776261258f5f7d9449775f1d28fd0a1ee9836116c2a3e394e38cf9b8700dcf29b7d011c8a7ab87f7d7467824fc88ddb62089ea8ac28743bd28900d92a419735907c2458b045bbc7d849909d053179fc855704322990a12e8e4615171539f9df92b505bf32e47e861f1dae9ebf9ba91fca3357bdec3c6bc39d5a1eb3cdefae989124086e01073fca50bf507d14d25ea1be06b53cd3f12fd9092"}, {0xc}, {0xc}}}, @m_ctinfo={0x98, 0x0, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18}]}, {0x51, 0x6, "c1d82d75d481e805646c226f7f7ffde7d498b90aeec2c068a0bb2f226da268410001d5fc21acbbbfbfc87c4d12e50117d0eba8cd56a4a4cfdef30e4a62504c559fb708fcf5f2b63d5dde8aa39f"}, {0xc}, {0xc}}}, @m_xt={0x10c, 0x0, 0x0, 0x0, {{0x7}, {0x98, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x91, 0x6, {0x0, 'raw\x00', 0x0, 0x0, "01a20caceddcdfbd7a48a0c729158998c60047066878b48ca4fb098d548320e2907622a09780fb66354148cdcc03173f09c666a28ce9abb9e5eafc2b95e4a29c632b94ff80998657a3768ffc1d372e5371ed26dc4575b93664a342be52daa8e5e948b2bf0db73a"}}]}, {0x4d, 0x6, "a61f4f76ec9aec01282aa408419eb71e125b7722cb258c38c9b4fd983b390b1b733eb1e593d4f58317134e8d78e759aab1fc21f91763a818aaf2e413a5cde7f2718ba84860915c0d2a"}, {0xc}, {0xc}}}, @m_tunnel_key={0xe4, 0x0, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}]}, {0x8d, 0x6, "966e741f9de50a55326c4288e39f8945d30ac43531113d05dae16b23e93801ba4539a292e34a9793b9216ba1116b5a215ad1d4d20daabfd3e82550759f3f98a772c34656c02c4561cbda1721b765b17306ecb8715f415aab140b77c5c3c6549b80fe1fb5cb4686c8a0b177e844134a49612dc2614a5710002dcdd8785f882212a466b5cc34b6050d93"}, {0xc}, {0xc}}}]}, @TCA_ROUTE4_FROM={0x8}]}}, @filter_kind_options=@f_bpf={{0x8}, {0x48, 0x2, [@TCA_BPF_CLASSID={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_FD={0x8}]}}, @filter_kind_options=@f_matchall={{0xd}, {0x124, 0x2, [@TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0xcc, 0x2, [@m_mpls={0xc8, 0x0, 0x0, 0x0, {{0x9}, {0x64, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_PROTO={0x6}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5}]}, {0x39, 0x6, "e43dfe5ca8c8ef0b831bede51ce01bd4ac17d72d2c793366ff7332ced1afb4e2631942b449800de9bb2fdaa0931ee6c014ac9ce070"}, {0xc}, {0xc}}}]}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0x34, 0x2, [@m_skbmod={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0xec4}}, 0x0) 19:14:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) 19:14:11 executing program 3: r0 = epoll_create(0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) [ 351.444271][T18162] loop5: detected capacity change from 0 to 8 [ 351.476229][T18166] loop4: detected capacity change from 0 to 8 [ 351.513115][T18162] SQUASHFS error: zstd decompression error: 2 [ 351.524386][T18162] SQUASHFS error: zstd decompression failed, data probably corrupt [ 351.539058][T18166] unable to read xattr id index table [ 351.549580][T18162] SQUASHFS error: Failed to read block 0x108: -5 [ 351.558514][T18162] SQUASHFS error: Unable to read metadata cache entry [106] [ 351.581644][T18162] SQUASHFS error: Unable to read inode 0x11e 19:14:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8927, &(0x7f00000013c0)={'bridge_slave_0\x00', @ifru_flags}) 19:14:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000040)={'veth0_to_batadv\x00', @ifru_map}) 19:14:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=@newtaction={0x13d0, 0x30, 0x0, 0x0, 0x0, {}, [{0x4}, {0x13b8, 0x1, [@m_mpls={0x134, 0x3, 0x0, 0x0, {{0x9}, {0x6c, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5, 0x6, 0x4}, @TCA_MPLS_TC={0x5, 0x6, 0x2}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x6, 0x7c, 0xffffffffffffffff, 0x0, 0x7}, 0x4}}, @TCA_MPLS_TC={0x5, 0x6, 0x4}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x8, 0x4, 0x5, 0x0, 0x8}, 0x2}}, @TCA_MPLS_LABEL={0x8, 0x5, 0x99ed3}, @TCA_MPLS_TTL={0x5}, @TCA_MPLS_LABEL={0x8, 0x5, 0x76aca}]}, {0x9f, 0x6, "338f277887b005c93f1ecf3b286a8faefd7e9344df11b1ace388c7dd88bd38e191e488ff864b4a25cfa336cf19be792f4974e5cc3ef0fe584d961a510554707674797842f12e21faa22f6aba7170ca46e0a416af54b81fb0b5c96456cb6811557d7e4afe62b2570ec82a03710ffc5a14522fcc805c9d3ef9a50dc0d38433d45536120213df78e691b369f41247a81b8d9291fa1ed963aae2916ffc"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3}}}}, @m_ife={0xfc, 0x8, 0x0, 0x0, {{0x8}, {0xc, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6, 0x5, 0x401}]}, {0xcc, 0x6, "1a09fa423df430e6d17a2217c087a6f464e6e6b72e58ddb962c93a922a899fbf0d236ac0a8f77dcbc5ccf467d71f0843d6ea929c96b0da2daf22a0a07bbec6b90b9a16d338cf28f43fac1a897bfb3e5ef3a645a3e54fca017cd8499b3ffd3a44c01e658b5fd8c77f92d9a926701b500fd89f6a2c67c714626366de68bbcd08d96e1526e378bd2edafe2aacf86a7391133e76f672d209049917e985cb9e3933603312a2f1be9190574f992d8cdcda49452d1005aa2e7675edfc711da8099712a12f4e42aac5a50ee8"}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ipt={0x14c, 0x1e, 0x0, 0x0, {{0x8}, {0x94, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_TARG={0x3e, 0x6, {0x57, 'mangle\x00', 0x24, 0xfffa, "482bc319f98e263c9dee7ba2fa3536b931f2f8ee"}}, @TCA_IPT_TARG={0x30, 0x6, {0x1, 'nat\x00', 0x6, 0x9, "21c31a1bd8b9"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_INDEX={0x8, 0x3, 0x3f}]}, {0x93, 0x6, "f462256bac088368ef136e7f61d69edb2ea3d0850831bbd8a2000112f7e3458f8a73df660248f957458dd9a977feb77024ef23dafb9ae78c5750ca17af2638baab7e377294f461a915c8c87600c1a687352c68534049c77b416de7922281d903d05148e4da2f5f7f59a512990b70589f0b7fe5a025353dff836e2aeb335021b37727be9a6d6264dece8121814aa6d2"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_simple={0x1038, 0x0, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x7, 0x3, '\xae#\x00'}]}, {0x1004, 0x6, "100f1b06570f09a05590161498fb0a062557c449cd1d56e8fa23b81f4e3f3f5c6db35e22ce6329d44934e37a459f691974c6c13f6736e25e6bfa42a07dd0bd9c5029a04717362a3c39035f1755a4b55cab166992092ac59c6465a1ec0a15e96bf9d91109974a5b74f483beef399251d07e279f59d01a55ac2be120d5a35f2a5b4819f635c0a2080a5daa059e7c0d9d84961602f1b7aa2ace54e80939c82467b055c51a187d2cfdb9b378fb0dfd5b93eb00bb9b672ab46acde7644a18a83b41d7a39030014b708ac82728801a0570778d2e112c9f717dba169bdd6e40fca062c435ee809be69e671e882d51a07d28aadcc474f95ca875f0baeac7d368faa4dfd44fd5443cc6d0a92b18412b809bfc493725cf1432050fd6e125a794068a47d9e8cf1c90ae9fa387a0fd424e7b3947ce65980ba1dac4c998608d7a27db692822f90d592c2bd54270ad6ba3755b653bc6c4be1443bb20d1ba413136dbd37b676526393eb52e0b38c11f1af189578ca674795f5cfe7db6a0cec36307f13e500f302dfe22f7256102d62e4e2be332cd86a5bae5bcf85d38099b604feb84af157ac40da8863added5291b726a5b320e8ee5d215cd3fd8cac718da7cf7c41720ebe021b212c24eea8747be50f544cdc3a2a1544a7f5d815db7bd00921cc3a1a2676c81799adf6ccc5a7baba9a090759744cc2153c5cac1a08480246ed094ed2eb24fb557382703751885fe4e65a657897301722c2a65c10b8a51d07f3cbedf2acd5cb25786970aab9014edfe2b09e11188aad189627a33b46ec05a8c283e525d71d8d40c60d94ff5c861717c5da426b57c80703243736c2bfe1c493a350fec0a1bfc8d6d4da1a9bcb2a710fd1484b74cf866d8a7efe88834b6121bc43d211d796cb02e22cbe7ecde0e07417f8468236ddb928a5f3bf625e5b4460412891cb60028b23f6e4860310936346d464af02d953cad7702412184307b2eef51cc891bd36d25957fa6edd94d708e6822a8e6b7a04608e8142c085f509fd20a6c72f2aef3b64855d5d9e2b99b7e4852eb4276ab727c3fa5e2d9c9fae77f0760fa2a343d07ddbfd17da567529460602b5bee9174c2e7e10fc110ee99bebbc55474830720eb3d807bbb3f3a8a880426e442f74e6f2622363f936a509e2277318eabc50f19ab17a4ee20616c289daad0b8dd61323624e81fa52b5bf6a3d754d4001de99433d0f379c56d96974fc92680cdcd4ced199bceaf7eea6e80d20aaa10b96b6654ed5bca96f3ca60eac2727d3011efe924d4a1f65319bedce984396794002922022eb5f00b235ff20eb37a1ccf1cbe59eec319bc94fe20a284224e14da4770b3f837e40b9f011aeda41247bc9d108e7a51f1e64aa4cb9b3f9eb9435a6cc4a891ccdbb89358d8da33ae5e7f7df2b6ed2aa61f776e01f6b1956fb63a35344d41a38d68031ecd1a3e468798c0008a79cb456c42bbedbfd59ebd8e3219bd4aed132ff5b250a3199312936fd921066a2649b950dac38c91daeb18c088423514c8f116a8e0c682a3bfda62d71cf8ae22db2f4c4a966e7738f8a3fb331cbd1dcf3f89724e60e864ad76dd426f6bbc5d531265b4411da6d275a5ffd36792ca2af7000a8c1c17d6f871070571793c621f980ee475476675f69c105634a4af3132c7bc4a1e3b72468ada6f7a882cef5c9ae9006dcd58b79b36604d76d35e2aa19655f941ce35e8ef064a023bc25c30d4e535c75bf56b45204ad436f0f365d8d859c8515daf97db6e9678d787732c6cc75a9bdc4900b53ab75b2da814d0598402b572154ff9e0b648299d603f11d668ec6e927a8831c112a4b095df5b5fdab813eeffec3644614fafe1832f7c7c96dba2a8256d9609d79608599b2dcf1ae2b068f300d6993c5854811bd267a4cdc25c068a97f00b67c21b6d06389699945dbe8bf00f1d05537942741e48b6ae1b4dd78d2d492b1e1af71158d9746e97cbec2e2781a1c7a57ce52c5b374e20d52a5defa6e10f39f748eb323a1d280471561faba3a39e33d3e38ef28e2ae4cc81c26d324a11eba51d8c54606a663ff5bb712bf434209b06fa020129ab150bdde41e132751326423363ed7d1a78e853460cca466eae5ae913db0e2c70fc73e9ea7dbc5e846087bb83a728449c1c1a027b4710765d46b5ac50e5b3f7b2ab28e7d9a1383d3a0c1c2306f2eccfa72dd17be12b344248dc6a6032e8069a52e33c1a0bcff721274a10f7e668846478a54ad1e5f1b35da260f6cce0f52d59039613265516d79523e6bb9fe014f5bcfb29302940d0473fc913ad7d99388dfc53a3a1066ed113d1dbf1669da6261a6353023f3e7643c4d6794c80a6c4b13dd47b4627c86f1f7a50d2481a7eb70f647a8a8ed02394995b29024bbaa0050a039b1c4edccf27748730849c68ecd702e89ed69b72388b7b4df1a50194175276bfd4cc507ed0d482aece841973300cb3b1fa80c20bafba14ba0dd4248326eaf4246beda18958ab5d9f9168672f48316852768bd9be794d34c7af71b1dc4b5c675f4dac4ac212aafd16053f0cd7bc8925702caa18b000550f84e356a06cb140ea507ac00bcdf53807ef41909b38e020899c599fff27ab29422d84a7c4d025d2dfe53a4edf32c34917b780d24c1ebb5dec48d8cfb57094745bae17c17b070f9f7e1f593f95ff331b5e37d605b23b5601b649b7475c0096bc6b7d9510caf02902ec3b14626b34370640b07e01fba35906622a9d5a15f803ba1e4b80e0025684127d94ad8c48b54b6f70bf1c92abcbba57812bb96b7fd846696c5070ef848e38410f9610e0bb27dd194059c6c3799446f801e8d4616497674d924490479f35ed88da0677aef5a5190260f3b47ce518239a79a8480cbf22d16d0c575acba14a6c8769577b58392587957308ec50906b2e2321ad65f30f491ecabdbd5a4849bc475ca9380bdefbd58e413641f9f77ce29f142d686bf3a85e1301034d5defeb854cbc2fb50d5612e91128e5a0b1e52e7f54cdfa23825669e1ae0a5a8d15c788f86ea010e3fa84f79d4a36ac98e924dd9e0d028b4dc6861010e15f4fa07fb270136e3e08519b9b83770c66b38da4df20c2d6928651b3baac3d1a28ba9d53def8c7834f34bb2e336d3b4e1991b46e669ba23699073a90d6bc71f51bb7af882f402965f3e47e7f5d0c8646177d3e2b625621345f5c72e9121ff99d20de17d212441f59f735d5631b892c0687c7e317d9621dedfdec5590057f1839b25e89f50037851d2d9d14c596e98f4945f53ddbf7338e226f70082e17ca72b102e364aeeee5a7bea5e2f57ab671e01da0788c4173bb7ac8fa0ea4b8cdeaaa8fa3fb44161e7aa2cd933999550c7d000a70a094b5c41f34b6b40fa541e6158b3746f0951263c279dbbb2c48d0cc197b8cab205fcd219e448194113d8e1235f8f259bb90ee89908fdef853060dd2540549e84e90311beb5033f7db62f09bc22ea04f94383468b04694b677c19f93ed6f8632e03a709ffcb3256f970c8ae3a402afa9c8a975e96eab41b4b9607925d6f08c54538eb53a6b962b1b3c9bc6dc5da342b295124ef6528023219b71d4554757ffded15c18cdb59e26bb22d33078148de624d248c31a2fe6306b929ae1d9baca88a9727a1ca1cbf2dc9f59577f456e30f9b595652d60856cd0310580e8e93ea88cf25ba92827822b9fbf8db757de4dd92db0e509d4e0a9a902a3018552ad7203acef96b0c0fb379e3d473c81a6152e4e6e16c8fa60570e8cbc200b8afd7a0c9c21aa4fdde6a2cef09dfd69923be01637454a687ba817dee5a12acc1c1b89e8c339289bb4876b6c30a40c60befab53167074d36ab801da1370d62ade8b80285d45786f0451d62e704148fdafa1808759b7ae0bff502f8986b54355392918280ef385c41b2cd53887caecd0280e78a36b750dcf4d341254ed9d5336dd8374a536a0af63f39f26fb92912aa724f2b8192617fb97b253b109539ee5a7750079db462a777d940ae5fbc668037a522709e4ab0e63f59faaa5dca31e5c11ed9b48ccbb54777f4c1c78381bacc2ca4ef9308e3dcc96a0a2ebc6d47dc23d595f1d2e10a5460f594fde236fe96a6eff8918bd2c6abb50a798bb0f88155ccdb5b01188fa478946353a4f294e530fb2c2839a1c8edbe9e050ffdcbcb498c967ff3e349adc133d8bed7aaee6491a6e0afce85e906347866356cb1d3020e3ac3dda5b5cb77b53bd8a8e1eb6f9f5158ec1c08eecfcd8ebc1b471c02a8dfdbc3c040d7aac6318402479b408d16a13d19ff6572e1a5c67a7349f4ed303b5ee2677401d40f523b907fa09e6c26ee2c7682d1b1955d74f978f4b99e2e73a2a2b64edf8a6b12e219f119935ff4ecc438c4baa885670234aba0640c6f204e2a1d0bfd1b39981f47478ed70439ce0e3515f3f54c225de4b5122f0d67dc8943b81a03a5dc679d7944da60e2ba9ac723fb720c6e9746a9c56ae66ef179323d5817121d2f023889d96b469c4e552885962c7bea5ef42533db4687c09e2e2ac980047700b56100ad1123df717ab1faaf38254df7e94c23374bc19687efe4bec7ab8b970d9349e13521335c09e068fde52dad0aa04b81ff5e4bcbfac52452a1a341437e2b0e78f7a70669dc69af676a2402a577d079c129d3138bdc68ca4daf16e8a4f586de44cc818e6a8d8ab49be4a9749ba88e8673d4c0cec583a397ccd64aec43906484e47e9a4e5ffacdd07ba9e44cd68aa7cadeb984831a58b46bf95354f6e45da318f0fc18f985b59bd8c14e22eea1b299bacb1db980a97dfedfb3f90c0f3483eec828bafb942e097c3903a6167cb37143154f4fb6c9fad63bdf9c35c0023391abfac80f97b0631e4915695273ecb7d4799d67a75bfa77b5f6838eae222ff3f7add01f13ffe767113c071522eb91048632cde206ef401a06bb3ae4bb286ba56d291bbfe115092cccebe7e478bbaae28a2eb4834273c0f3f907bfebe28995252e5f6d27dd0076db70725a87a54595d529ae263aa13149ce569b08b57668f0cdef0466f9b50c1cc14c104188255a054d359b678e13526b959f06f1e908967c77aae25264198a8b457bbf7c3faec2ba8c95e850a0ed6c691bedb6e81897ac8c2bb24e670bb5644ab59f5afb073ae06b972276a37e63ddbdbf0028e4ccae7e5e4d84190dbc9f2c0cbc3afd9f7e201ffb3cab05bf7abe17708da7fd36d7321ab81e69bf22a0bb6199e2ebefcf3e9121853af84c54803012cc5c038355858aa09d09c3d294d700c7a241068dfbbc5cbd5744e7ecf9f27cf7b4fa961fa3e49f66a4ab072b0e347f7f341a7ae976d5abde24ddb2dbc16168a67ff09abe641a21d0d3bdffb930ed0c1bde0690485ce77178b511108c54925ab847fe9b0ea0845126490dd6df1026e8b2552840d14d0364ae8d3ec5d8508a3000ceb3483cf5ff50d0e59d5ac9e549c33585c79e7f6eeece36438618f66452c26555850b9f111de3f00638b7a3614848f3d646859d1e533d995104fc2b0f90dfc9ef271e69a8ab1e2385601e01bb7000f2484b4ab4c4c976231a06dc0b8de27c6df2905fd1ca76c80d638ca02fea3e140c766a5b7778dfbb7ef042c5349ddb243e7cf19757e922938806e2de113c5098299781f7dc44a3a7794250a27e9db19180711f40e541f4c96cf1db33b015b4ee1026be77d0234afb1b1915ee1d7b5eea49790b565986ab95ae12b689aca3d1f918099e39b028b68e0d88a7369d21d848069294fd14d60b0aa06cadbee0ac6792421f593aa324c26fe22acf3fa3c1161628cd5ce47ab5082ccf54fa68e098329f3a2d9b9e30206ebb"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0x13d0}}, 0x0) 19:14:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ea}], 0x0, &(0x7f0000010300)) 19:14:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x891b, &(0x7f0000000280)={'veth1_to_batadv\x00', @ifru_settings={0x0, 0x0, @cisco=0x0}}) 19:14:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @in, @generic={0x0, "5ebf958eebcda226219ed5f5bfd2"}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x5, @local}}) [ 351.988066][T18186] loop5: detected capacity change from 0 to 8 [ 352.002800][T18189] loop4: detected capacity change from 0 to 8 19:14:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x22, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:11 executing program 0: syz_emit_ethernet(0xf8, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c200000e94ba6c7d72c808004c"], 0x0) [ 352.067947][T18189] unable to read xattr id index table 19:14:11 executing program 2: r0 = socket(0x2, 0x3, 0x6) sendmmsg(r0, &(0x7f00000008c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}, {{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x2, 0x0) [ 352.124381][T18186] SQUASHFS error: zstd decompression error: 2 [ 352.160942][T18186] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ea}], 0x0, &(0x7f0000010300)) [ 352.185168][T18186] SQUASHFS error: Failed to read block 0x108: -5 19:14:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8914, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 19:14:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000001400)={&(0x7f0000000700), 0x2, &(0x7f00000013c0)={0x0}}, 0x0) [ 352.228306][T18186] SQUASHFS error: Unable to read metadata cache entry [106] [ 352.240067][T18202] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! [ 352.253170][T18186] SQUASHFS error: Unable to read inode 0x11e 19:14:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x1, &(0x7f0000000500)=@raw=[@func], &(0x7f0000000540)='GPL\x00', 0x7, 0xbe, &(0x7f0000000580)=""/190, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:12 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 19:14:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 352.344941][T18206] loop4: detected capacity change from 0 to 8 19:14:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x16, 0x0, 0x0, 0x8000}, 0x40) [ 352.411279][T18206] unable to read xattr id index table 19:14:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x11}, 0x14}}, 0x0) 19:14:12 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) 19:14:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ea}], 0x0, &(0x7f0000010300)) [ 352.524468][T18218] loop5: detected capacity change from 0 to 8 19:14:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8922, &(0x7f0000000180)={'ip_vti0\x00', 0x0}) [ 352.620463][T18218] SQUASHFS error: zstd decompression error: 2 19:14:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003e40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000002}, 0xc, &(0x7f0000003e00)={&(0x7f0000000180)=@newtaction={0xec8, 0x30, 0x1, 0x0, 0x0, {}, [{0xeb4, 0x1, [@m_gact={0x60, 0x0, 0x0, 0x0, {{0x9}, {0x34, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}, @TCA_GACT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_pedit={0xe50, 0x0, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xec8}}, 0x0) [ 352.660836][T18218] SQUASHFS error: zstd decompression failed, data probably corrupt 19:14:12 executing program 2: r0 = socket(0x2, 0x3, 0x6) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0xbb00, 0x0) [ 352.704394][T18231] loop4: detected capacity change from 0 to 8 [ 352.713462][T18218] SQUASHFS error: Failed to read block 0x108: -5 [ 352.752991][T18218] SQUASHFS error: Unable to read metadata cache entry [106] [ 352.764759][T18231] unable to read xattr id index table [ 352.815777][T18218] SQUASHFS error: Unable to read inode 0x11e 19:14:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, 0x0, 0x8000}) 19:14:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000", 0x2ed}], 0x0, &(0x7f0000010300)) 19:14:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000000040)=@newtaction={0x14, 0x73, 0x1}, 0x14}}, 0x0) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 19:14:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x8914, &(0x7f0000000080)={'sit0\x00', 0x0}) 19:14:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8993, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local}}}}) [ 353.179373][T18250] loop4: detected capacity change from 0 to 8 [ 353.199255][T18253] loop5: detected capacity change from 0 to 8 19:14:13 executing program 2: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 19:14:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=ANY=[@ANYBLOB="240000002d00010000000000ffdbdf2500000000", @ANYRES32, @ANYBLOB="000022e30900000000000d"], 0x24}}, 0x0) [ 353.290610][T18250] unable to read xattr id index table 19:14:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ed}], 0x0, &(0x7f0000010300)) 19:14:13 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff}) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="37014f83e20000000000810600cfee11f34d33f74b649b8fbf8f2fd46ded81a4aa1f36e1eec95e123ec4a3268b3e6620f7b6f456281fc92fec4893f25653bf9390fbe6bc6e259096dc580fcce44cecfe8fd0537f52a2b59e13782aaef6201f51685460bde7f5e40093a496bc882161ece33890d4fe935a9c5e7d", 0x7a}, {&(0x7f0000001a80)="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", 0xea9}, {&(0x7f0000000900)="cac54872ab0ee8ceef70c30d2c8f195fda282ba6194b4ed5a3ee7b1e4e84095d895ce2fea75d0b45345374966dda27aecd156cb9d9fa00211948f29bbf450a88cb66dc65f960300185128e8a818c56d736ea4320d10e987bcdf33dd796302843110dda51b70d9b5b12d9148177a81dafe89cd4004eb18cf09cc03af9afb5c228da80635ea6358be29874ad91a822c6f273b3ea128079d766a59ded921d99b1174964ef338b119d75fcba9a877341af3971d2cb208a69062da8771c1b5587b07648c3cd17a038a0d363408bec6e466cd814396efb29487c92c5e5064ae53a89025a7fd321a52d7ccb4418369c303e54cdd5b5997131f2877447ab522adfb78e4efb57f9c829706f34343d4e9ccf4c75300bde669896891a7e328d4ead106543d4bd2e6503e877e676a3b41f1869b2da88b719b409f95bfc5e4c69beac1e66dca83c4c36c666918fbce864573ab65ef8f529c6bddaab9097517c2fd558bb6c96a4a58656cd842bc8ff87738172471d758b7332ed8d44aadcc8bcf01146eb0d62f9d5f189166120382db2b6db147262fc8f1d3511410ff5f40b60961adb10fe7a11570f42a9a1b04d4554264298b1537ba0e1a8762ef72e3828b462db913e6897d8593a01b8681d5b5d80670aad163b441e9bd859aa6faf0485204f3f1aa4c1c6bf7bcad7817354f693b4e5376f9e46f870f73f8066c63cea04ec82111ad5c01353602f51f7eea96aa6c83883e2ecada82fc1b36008f2cb3f4eea7b44793ea444f20db9a76d50509e92c382f7547576099607d68a0d95a7d157a0d55bc42be3b0192f605022e31c63f828a1154d6cf305215a33b4ab8bb8234aba3ad9816b357ec2bb723868e8945e87c2403c02e7d4cb71cdd12d6f18d3016bee0291cff6507bffe8553094eb50ef101b31877f2013bc2f0f41ab621062415176a5529a597ceac8f5f99b0ba140f7791def219b6766d5b1fb9a2f13b83a2c1a3991fed9c9d9978daebcf92d3b938a4a02c8e4523a5b1780742d3b5069f40ef71dba60ba62d9641f9ffe37ffdffa929cfacee1e83d6ab33a7265dc58fa4bbb9b31a2775409505e42d4e7720b7863b2e7bf8609845c85f985252b50db61f5d6121de553d8699c23eff28fca0040939ea28f7567b2c0ab7d582c7bb4d1b6cce36477cacddd8ffe786416dbf8303b11721570d6728c0280b085cfc9d282146a91aaa47bcbf405fb42007854fbdd1cfbed588808d7a8cde06589a1210acff10312911411ed4c682ba8899f33d415e7ff4aa41f0e1bfb82d1d933189c5e2af0e7af3c7ad9dda5e6fdbcf97c460812f4a01e2ab6cedf09f85172148eb2d3469b399274a9f347dd07fe0b7b375267b43f8039b38dba0346f63f650ac09b493ed8185b463a130fd0609c55ed72fe449d70a222c1aef9ced31d5f688154b04047f5d306f23314a9f1e6b77c0b49b50f7e0948900fc2733b29a885f13feb4b156a39b18c664a9b1847ecf45d52bf27e4b8f9bc52567928926914aebabec74c3939b04518bff2ce8f0c74866af82204fc2826ad5f974aaf396c23876f70a39642be6d26165f9881f1474c16d410b520c0c02b7e105ae2275db8a2ac2b04b4d95deea85c4ad7d3cd81154d12d37242498f5b208f96d5140b6662c371c1b0602a4069bcb956ea797bd247de32eb089469bf414754e0d7de90274a99eb1e172c30f194cb18ebd865904f4a3e76142d86c61abcdafac054b4e5f62eb2d36fd84c65c2808740eb28b61f89fa96723e4e5ff130358ec8297677c2932fe41dcb642f1d6055ffb2f499660193285007285d7befbce287ed4d23e155af1157bc6977a678c8c7b83562caa0c14c04033f129ffbe47950fdc3fb8e2f2eee52a30474d280fb784dad07b47011dae3f54378cd5abdff4b183442e2138dd3b6cc7727c0dd5eff5df773e1489039c20342bc81ca445715a1ba21200dd5e6a1064dcc469bfa3c05fc21b502912e3f3600c754c59b1d937fd99d8147fed94c3b8041c0ca6b00eef71a452703f40e9fe1e8f5603bd5d78b585b7c7b2fcfc7c0ec07d5c78eb7bad166ebd3acd8ff8453a9852c46dbec976c280e0e8fb87074e03d391d2ba400b64f91960bbfed8bd565a1325e595a5d0f0b217ba97fd1e50a37d11a0bcb6fa557ebbd1b201c3d04a44f5567792ca01647ab373054f51dddaa67450a8c7ac21cb6104e36571b1961f6172932b7106237a0c90d2c0848f2e8f084a4074343694ad23a45225169580a36a23eff4eeef8f2e6d0c498e9efd0c96369e0ad0055abfa220bfe4641ec3a35162737c49d84f33309926d7d664004f00b0474ebacc7adc1b58f6d7fdb6cad865771fee9f3412a995b2220bef5de08590a56d29f14760f846369ccb889e29a07f1a8db48f4c82bc38d04ea1f41f2879a3ebdd84d0c7dd0ac786ecd16c8a2928e6748b23354eb9c9f6cda92261752bd32e2abb16127d871dfa070c916b76ada8f444162538630ff1743ffdfecb69b55c29fe1cc04f5cf1b0bbd394c8b3763d6bb5f860919f93db67839c0aaff6375fd15e23477a000654bb842789ccbfb6ce1f5433ab79049028ff0a27d2a0b1151dc6e15dc0d58e48b7f3a83068b8eb348331a9f100d9e9db681b7a9c46a7ab11992cf82f8356ee36cba5c21043119979ce3692f64fd09fd087d097512c7e0ce2e3a5d166bd7481b59ed6bd9825b35359ba2ce91cd5179efecd94cbd9a09be7c9f673bb6865f508cf8b5fd19569b6e6bfd93796ae539c8e28d43694262b5e5edccc4ad94c45fa8bf1c8808218d61e292223b18d400c11a0a8e4714048e108838e9af6874094fff009b8796dc71d6b4dc19e3eb7218ab79b6ec748f731f496698fe69b3db7fc1a314509bff053a1a2414b990636281cac16531a5f3961594c80667329d7c4b8ddfe187f5704aa0ab7dac3b7481688cb9a3e6dc51e2246a86ab5bb3dd56d68173d5bced034540341336cafeddb1d4b70f6bb23fe88e46a581350d852e3e51712a19690d5bd8a267df8b97ee1e361fd760af9b848202075935850fb47a8ed1746f8983c0243419c4481efce88f3175409d8e587e908e35e7ae637d2784935235d594bd5836ac8703bd5a27d5a99dddf485ae3f84ea9ccedeee845d3cc6f7e24a933a1e8e87657440a9f6d22701dad4cb88fc2cb34f929b8f0ac7229612471c49ec6de2b850fda3710debf4e57006d972f242402a34e2b9fd30cb93e572ee4244b8c0efc570d7f940d8d34932055a5cb7c8b66b40142904f0595b179c54cf213aced63f35dd1e61642c5d6a98f69ae62e7ee2ca7d27624addc6c3d0696e562d1aeee17c58bcf253ed813d153542219738d5fa05bb0546441f21c9d220c17c93a0bc053bcd4aa5c89230b998e4418dc45b8a23571f8595994c6643009404016a96776014e63cc47ba42530f2f1aabec88805b88c13b1c7b143cf5970d856a50e8298821ad8b91494c07562acb14223a360d4734b3e0fdf71f17d6e74b9a42b961362691afae10ca1fff8862141a5f65be05491429b97fc783b2077250d851846ab14a4551a1f2915f6c53f63c565a4146dc2db59bc040d97ad2f8a8a5b21268d38c37f3bf6284e38546b9bc9275edcd47c0d9b4d332fb239ae26c6a00de09a1ebb5f88d2f44835b665d2ec7d52b428d0e255d965864ae2ac72ec64461a006aa3352e7f7d521403d42092a3dcb455e06fd993a5cdf0e730119c53193c7fe91ea159dce94ba0bb0a815f433583638423fe5d612236e0c1e1bb5d5a3620cb82bdd8523a6bab4c8fcf3545ca127e74166d8d243a5e3d66c9612f015081e3d04781403c5dc1a69058f1fbc47a9a584d8a2b5d1dee4ac20267ffb916f683e8daf09394ce7a3d80a617b246507d155d92f0c303f6c3fded9cfde966d685083b9ccf766bcb6ad75167d0b0c0c05a1c60b53efa58e43a6d22e6a85410c45a4367e759b8d9e9027f348f698c105407566034f9ff1a12e603032693f62d27d9c8d8901e402767b62b29d499a4f3e3a5f9eda2e8b566a7b78c3c2287e3c5c02df5839099d071bc4f3891b584ee53b95ee149b721d9dd96786faab234cd0004ec25884ea297252799836b3ec7e070ea709d4c42da45d5690f48295fcabffadaba5ad1d732a55ecd34a15714fe2345e7bac5cf176668ec573505e8d2afdaacfc089a7ceccb43877c06b6b6fa581c4eb03f66b725f1dfb91537637dabd69d101d8e4dba19ca1dcb192229180da83092e9cf8f682967b5ef1ff2d15d063cb1fead947daa61935b597a57d8e32a61788e8c0778fae55a98ff7084f6eb022e81f48f1acaf5b65a4c7df0665545dbfb3d15862706f5a90bfd18ad5c4dbe436fda7e8ec37b10045f8f137c7b00fde53335f625adfa0a7d867a217bf8f9c7c0d111df135bca0673ba2e617a4b0da75b4b9cda8b0090bbe834ae3e3498a9f496c21b9b8344e83d6bddae12a115b365d2006d216ba0b64de62b771432c2e6b79af1018f97b011aa2dddf80035f2e23d72958025cdc738ad86ff0287b4a69928a1f6aa95324b01dfd081099e1bd6b257fdd683fb3e9fe44fd1cc3b1c1b21d4a79e2a6ab9a2ca7be5a043933895ff820438b658fd545311b03f3dc87b2d3b590ad9ee638ded20f05beae74007298a9e1eedd571f6c9c012f2c1ce217f94d9943eac8b9079de0dea4841669bd55d312a8644f32a466f29721780e1b76a6b3b2857addbb5530c090fe1e53da0cb92ebddf4d6f6b62bfba4200e00c86386d67a699cface990c7b2ee896d9f4f1458b534960977191d13a30bb7f456e12129ce86df350b05c6134ce677814a00e9840b4cc395d22d370a2d9a41d376af7c0f8a419daf9c92d95fa3478466b2753deca5eecbb503ee4e534909eb393e243a0b8c22e04c4565a4153c34ac8475671bfd7ec374eac8f4a64f31495b900aa5f9f178a99648bcad687e7642833f269f162b69f8c126f7e9b54293f17bebfe619fd48dd29e1cef8b132b7af25e8e2e49b95afce936d08fc344b48b2f007c152d4973c2e7371cdc7826efe643dffbe04569e864a8f8f96c8d941b944c510392120b00cc0afd65de20447d4bce48ce19eadd18d94533500dd6d9e239b7139489a2cbfbe6449e33087f564bf784e82a25b22ddddae5d93fe725d2613f428cef171f461c9823f4c8f186621ec042672da92eb0379f12e49ef8dc5e2883bc3118311b9bbf58e7210a937a062331eeaa97dc77d743cf8a1ff0d2ebf5342f53ef5cce549cfd6c425ad8c611ef840ff97116dc243beebc569894f6131e541e47e33fcf694a65881e0cd11c72acda9dc510096aebc01b5cbef5365f9eb42279eb10f5e697d24259d562704710e32053bea449bb8e74eef2a1b9c764e1e7ffaef5cabe8e56c4f3b48f63564b39267964a91c089caf1ef6eef86704751c3c10ee3b30fccf92171c05af22db901817c0b342a6654cd5ab5b08ec4e88cb5df589be56c23c9a919da0de69e2d24636a5abf13f65c2189a2554a5c8336b9a27dbe25d16b1050c4dbb6b772ed0a1f8eec3b34fd3c6a358c465193f4098340ba5fd54b5e1ba65492fc563fa248db24a4e1d1eb981ca94e23dd4ca7d28249075f629b06542dea71e04d53eea5959ccea73a3b812b8b18eabd2bd4222024bd1e1e335829fc7fdc7f80d5dfa659b9b939ab", 0xf9e}], 0x3) [ 353.461452][T18266] loop5: detected capacity change from 0 to 8 19:14:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) [ 353.581268][T18272] loop4: detected capacity change from 0 to 8 19:14:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x1c, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 353.637212][T18272] unable to read xattr id index table [ 353.697962][T18279] loop5: detected capacity change from 0 to 8 19:14:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ed}], 0x0, &(0x7f0000010300)) 19:14:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000040)={@dev, @multicast1}, &(0x7f0000000000)=0xfffffffffffffcff) 19:14:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 353.899639][T18286] loop4: detected capacity change from 0 to 8 [ 353.975844][T18286] unable to read xattr id index table [ 353.989918][T18290] loop5: detected capacity change from 0 to 8 19:14:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x1) 19:14:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000012c0)=@delqdisc={0x24, 0x25, 0x1}, 0x24}}, 0x0) 19:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ee}], 0x0, &(0x7f0000010300)) 19:14:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000040)={'veth0_to_batadv\x00', @ifru_map}) 19:14:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x1, &(0x7f00000002c0)=@raw=[@jmp], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x78) [ 354.770672][T18306] loop4: detected capacity change from 0 to 8 [ 354.792280][T18308] loop5: detected capacity change from 0 to 8 19:14:14 executing program 1: r0 = epoll_create(0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) 19:14:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) getpeername(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, 0x0) sendmmsg$sock(r0, &(0x7f0000004c00)=[{{&(0x7f0000000140)=@phonet={0x23, 0x0, 0x0, 0x5}, 0x80, 0x0}}], 0x1, 0x0) 19:14:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) 19:14:14 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {&(0x7f0000002940)=""/4096, 0x1000}], 0x3}, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)='7', 0x1}], 0x1) 19:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) [ 354.892111][T18306] unable to read xattr id index table 19:14:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:14 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 19:14:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ee}], 0x0, &(0x7f0000010300)) [ 355.117568][T18328] loop5: detected capacity change from 0 to 8 19:14:14 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001740)) 19:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89b0, &(0x7f0000000180)={'ip_vti0\x00', 0x0}) 19:14:15 executing program 1: syz_emit_ethernet(0x16, &(0x7f0000000000)={@empty, @dev, @void, {@llc_tr={0x11, {@snap={0x0, 0x0, "15", "9ced43"}}}}}, 0x0) [ 355.290676][T18339] loop4: detected capacity change from 0 to 8 [ 355.292142][T18340] loop5: detected capacity change from 0 to 1 19:14:15 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={0x0, 0x0, 0x1000, 0x0, 0x7}, 0x20) [ 355.336966][T18340] attempt to access beyond end of device [ 355.336966][T18340] loop5: rw=2048, want=8, limit=1 [ 355.349249][T18339] unable to read xattr id index table 19:14:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=@deltfilter={0x24, 0x2d, 0x1}, 0x24}}, 0x0) recvmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x42) [ 355.400517][T18340] SQUASHFS error: Failed to read block 0x0: -5 [ 355.431424][T18340] unable to read squashfs_super_block 19:14:15 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000007580)=[{{&(0x7f0000001480)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "a064dde1792d6441472930664cf6c821b64d8e0b45602f2e5f4a111069a293a47836b056dbf5ab7e60b1a4d6977951fe87a8e4445d6cdabb4ead21fd8e5b6e"}, 0x80, &(0x7f0000002c40)=[{0x0}, {&(0x7f0000001080)='h', 0x1}, {0x0}, {&(0x7f00000011c0)='J', 0x1}], 0x4}}], 0x1, 0x0) 19:14:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb", 0x2ee}], 0x0, &(0x7f0000010300)) 19:14:15 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x1f, 0xaf6, 0xa95}, 0x40) 19:14:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001100)=@newtfilter={0xec4, 0x2c, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_route={{0xa}, {0xd10, 0x2, [@TCA_ROUTE4_POLICE={0x81c, 0x5, [@TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x520, 0x101, 0x1, 0x7fff, 0x7ff, 0x0, 0x8, 0x7ea, 0xa0, 0x6, 0x2, 0xaa47, 0x2, 0x101, 0x8, 0x100, 0x10000, 0x1, 0x4d, 0x5, 0xfffff000, 0x4, 0x9, 0x1, 0x5, 0x9, 0x4, 0x9c1, 0x1, 0x7, 0x100, 0x0, 0x200, 0x8, 0xa9b, 0xd8, 0x0, 0x200, 0x1ff, 0x1, 0x8, 0x200, 0xfffffff9, 0x1, 0x2, 0x0, 0xf3b2, 0x3, 0x2, 0x3, 0x299, 0x80000000, 0x200, 0x5, 0x2, 0x58a, 0x3, 0x9, 0x48, 0x0, 0x5, 0x2, 0x2, 0x90c9, 0x50, 0x3f, 0x7, 0x3f, 0xfffffff8, 0x1, 0x5, 0x17f, 0x2e37, 0x1, 0x7, 0x3ff, 0xfffffffa, 0x5, 0x6, 0x1959, 0x6, 0x1, 0xffffffff, 0x6, 0xfffffff9, 0x6, 0x3, 0x2a298ab6, 0x0, 0x7, 0x29, 0xd650, 0x8, 0xff, 0x8, 0x3, 0x0, 0x2a06, 0x8ff, 0x1bea, 0x8, 0x8, 0x7, 0x81, 0xffff, 0x20, 0x7a, 0x9, 0x1, 0x7fff, 0xfffffff7, 0x80000000, 0x401, 0x1, 0xae, 0x4, 0x800, 0x4, 0x8, 0x10001, 0x7, 0x7ff, 0x3, 0x6ca954ea, 0x0, 0xa, 0x7f, 0x7, 0x3, 0x89, 0x2, 0x1cb6, 0x1, 0x1ff, 0x100, 0x3, 0x5, 0x9, 0xffffffff, 0x1ff, 0x0, 0x100, 0xb8, 0x6, 0x80000001, 0x9e, 0x81, 0x8000, 0x8001, 0x200, 0xa8e, 0x80000001, 0x8, 0x5, 0x6, 0x7, 0x56, 0xaee6, 0xffd, 0xce1c, 0xc71, 0x1, 0x4, 0xffff7866, 0x7dd859c5, 0x4, 0xfffffffa, 0x81, 0xffffffff, 0x3, 0x7, 0xfff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3, 0x3f, 0x4, 0xfffffff7, 0x2, 0xfffeffff, 0x7, 0x3, 0x6]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @TCA_POLICE_AVRATE={0x8}]}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_ACT={0x4d8, 0x6, [@m_mpls={0x58, 0x0, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}]}, {0x21, 0x6, "3548e670af3ff60723bbbcb11a65446d82f7461f7fa6a24bfac9c9dc61"}, {0xc}, {0xc}}}, @m_vlan={0x4c, 0x0, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_ID={0x6}]}, {0xd, 0x6, "8388e3415c2a9d6893"}, {0xc}, {0xc}}}, @m_bpf={0x1a8, 0x0, 0x0, 0x0, {{0x8}, {0x9c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{}, {}, {}, {}]}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0xe5, 0x6, "5be42b1fd57e17aab02624d76ba7e858e2769701c0cbd02285e2daf2bced8c2f362f2e697f7c03d76beda9c1f021d4ef3895c50158b2c8f62f59a80a0b921cf7c109cb822cc46317776261258f5f7d9449775f1d28fd0a1ee9836116c2a3e394e38cf9b8700dcf29b7d011c8a7ab87f7d7467824fc88ddb62089ea8ac28743bd28900d92a419735907c2458b045bbc7d849909d053179fc855704322990a12e8e4615171539f9df92b505bf32e47e861f1dae9ebf9ba91fca3357bdec3c6bc39d5a1eb3cdefae989124086e01073fca50bf507d14d25ea1be06b53cd3f12fd9092"}, {0xc}, {0xc}}}, @m_ctinfo={0x98, 0x0, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18}]}, {0x51, 0x6, "c1d82d75d481e805646c226f7f7ffde7d498b90aeec2c068a0bb2f226da268410001d5fc21acbbbfbfc87c4d12e50117d0eba8cd56a4a4cfdef30e4a62504c559fb708fcf5f2b63d5dde8aa39f"}, {0xc}, {0xc}}}, @m_xt={0x10c, 0x0, 0x0, 0x0, {{0x7}, {0x98, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x91, 0x6, {0x0, 'raw\x00', 0x0, 0x0, "01a20caceddcdfbd7a48a0c729158998c60047066878b48ca4fb098d548320e2907622a09780fb66354148cdcc03173f09c666a28ce9abb9e5eafc2b95e4a29c632b94ff80998657a3768ffc1d372e5371ed26dc4575b93664a342be52daa8e5e948b2bf0db73a"}}]}, {0x4d, 0x6, "a61f4f76ec9aec01282aa408419eb71e125b7722cb258c38c9b4fd983b390b1b733eb1e593d4f58317134e8d78e759aab1fc21f91763a818aaf2e413a5cde7f2718ba84860915c0d2a"}, {0xc}, {0xc}}}, @m_tunnel_key={0xe4, 0x0, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}]}, {0x8d, 0x6, "966e741f9de50a55326c4288e39f8945d30ac43531113d05dae16b23e93801ba4539a292e34a9793b9216ba1116b5a215ad1d4d20daabfd3e82550759f3f98a772c34656c02c4561cbda1721b765b17306ecb8715f415aab140b77c5c3c6549b80fe1fb5cb4686c8a0b177e844134a49612dc2614a5710002dcdd8785f882212a466b5cc34b6050d93"}, {0xc}, {0xc}}}]}, @TCA_ROUTE4_FROM={0x8}]}}, @filter_kind_options=@f_bpf={{0x8}, {0x48, 0x2, [@TCA_BPF_CLASSID={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_FD={0x8}]}}, @filter_kind_options=@f_matchall={{0xd}, {0x124, 0x2, [@TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0xcc, 0x2, [@m_mpls={0xc8, 0x0, 0x0, 0x0, {{0x9}, {0x64, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_PROTO={0x6}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5}]}, {0x39, 0x6, "e43dfe5ca8c8ef0b831bede51ce01bd4ac17d72d2c793366ff7332ced1afb4e2631942b449800de9bb2fdaa0931ee6c014ac9ce070"}, {0xc}, {0xc}}}]}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0x34, 0x2, [@m_skbmod={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0xec4}, 0x1, 0x0, 0x0, 0x851}, 0x4000000) 19:14:15 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 19:14:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000080)) [ 356.037438][T18366] loop4: detected capacity change from 0 to 8 [ 356.037438][T18365] loop5: detected capacity change from 0 to 1 [ 356.068032][T18365] attempt to access beyond end of device [ 356.068032][T18365] loop5: rw=2048, want=8, limit=1 19:14:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x23, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=@newtaction={0x4c, 0x30, 0x1, 0x0, 0x0, {}, [{0x4}, {0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x0) [ 356.128540][T18365] SQUASHFS error: Failed to read block 0x0: -5 [ 356.134794][T18366] unable to read xattr id index table [ 356.184329][T18365] unable to read squashfs_super_block 19:14:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, 0x0) 19:14:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, &(0x7f0000010300)) 19:14:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xa, 0x8, 0x8002, 0x101, 0x0, 0x1}, 0x40) 19:14:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 356.460830][T18386] loop4: detected capacity change from 0 to 8 19:14:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8936, &(0x7f0000000040)={'veth0_to_batadv\x00', @ifru_map}) 19:14:16 executing program 2: socketpair(0x11, 0x3, 0x8, &(0x7f0000000040)) 19:14:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000f00000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, 0x0) [ 356.536850][T18389] loop5: detected capacity change from 0 to 1 [ 356.572548][T18389] attempt to access beyond end of device [ 356.572548][T18389] loop5: rw=2048, want=8, limit=1 19:14:16 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 19:14:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x16, 0x0, 0x3, 0x8000, 0x600}, 0x40) [ 356.626761][T18389] SQUASHFS error: Failed to read block 0x0: -5 [ 356.638852][T18389] unable to read squashfs_super_block 19:14:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) 19:14:16 executing program 0: r0 = socket(0x28, 0x1, 0x0) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 19:14:16 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x80000001}, 0x8) [ 356.799301][T18406] loop4: detected capacity change from 0 to 8 19:14:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89b1, &(0x7f0000000080)={'sit0\x00', 0x0}) 19:14:16 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={0x0, 0x800c0000, 0x1000}, 0x20) 19:14:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, 0x0) 19:14:16 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff}) read$alg(r0, 0x0, 0xfffffffffffffe9f) 19:14:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) 19:14:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 19:14:16 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x5452, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 19:14:16 executing program 0: syz_emit_ethernet(0x43b, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd65"], 0x0) 19:14:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8942, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) [ 357.116999][T18427] loop4: detected capacity change from 0 to 8 19:14:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000180)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x7, 0x9, 0x3, {{0x38, 0x4, 0x2, 0xf, 0xe0, 0x66, 0x0, 0x4, 0x4, 0x0, @empty, @broadcast, {[@noop, @ssrr={0x89, 0x23, 0x2e, [@broadcast, @rand_addr=0x64010100, @loopback, @remote, @dev={0xac, 0x14, 0x14, 0x7f}, @empty, @multicast2, @empty]}, @timestamp_addr={0x44, 0x4, 0x3a, 0x1, 0x6}, @ssrr={0x89, 0x1b, 0x3e, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x1d}, @loopback]}, @end, @timestamp_prespec={0x44, 0xc, 0xad, 0x3, 0x8, [{@loopback}]}, @ra={0x94, 0x4}, @end, @cipso={0x86, 0x77, 0x2, [{0x7, 0xd, "bab7f14c854f33c50d3d14"}, {0x0, 0xe, "5c7637b1237f0f44a7f55ac6"}, {0x6, 0x9, "fa2f2f9f248566"}, {0x2, 0xe, "cf5d2d63624b34a275c157ff"}, {0x2, 0x12, "d1765ca797036a87b8fabb20e44e7f64"}, {0x1, 0xa, "617ca9a638e3f004"}, {0x0, 0xa, "822a6e8102094a72"}, {0x6, 0x11, "613bd2853db666c137b52fc469e7d2"}, {0x2, 0x5, "148dd2"}, {0x1, 0x3, "15"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x2f, 0xff, 0x81, 0x3ef, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}, @mcast1, 0x1, 0x20, 0x836, 0x9}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x48, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4040090) 19:14:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000010300)) 19:14:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1b, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}}, 0x80) 19:14:17 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) 19:14:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000000c0)) 19:14:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:14:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, 0x0, 0x0) 19:14:17 executing program 4: syz_emit_ethernet(0x43b, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd"], 0x0) 19:14:17 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4012, r0, 0x0) 19:14:17 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={0x0}}, 0x0) [ 357.673965][T18458] loop5: detected capacity change from 0 to 8 19:14:17 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) [ 357.738973][T18458] Can't find a SQUASHFS superblock on loop5 19:14:17 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1f) write(r0, 0x0, 0x0) 19:14:17 executing program 1: syz_emit_ethernet(0x2000043b, 0x0, 0x0) 19:14:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:14:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8918, 0x0) 19:14:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff}) writev(r0, &(0x7f0000001a40), 0x10000201) 19:14:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha224-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="6f8cc31886d28f2bc76de5291f3a6353025ad5b691fe8ce5471c6bd5c86ab0afedbd1b91ce2e2922197086f6f42787bfffd3572bfc458f234b85ac5757423c7a91", 0x41) 19:14:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@empty, @rand_addr=' \x01\x00', @private2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x412803ca, r2}) 19:14:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000040)={'veth0_to_batadv\x00', @ifru_map}) 19:14:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1c, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 358.144743][T18480] loop5: detected capacity change from 0 to 8 19:14:18 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 358.212500][T18480] Can't find a SQUASHFS superblock on loop5 19:14:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010300)) 19:14:18 executing program 2: pipe(&(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 19:14:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x890c, &(0x7f0000000040)={'veth0_to_batadv\x00', @ifru_map}) 19:14:18 executing program 0: mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x36db51c215fc7f3d, 0xffffffffffffffff, 0x0) 19:14:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000b80)={&(0x7f0000000700)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@dstopts={{0x18}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x40}, 0x0) 19:14:18 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={0xfffffffffffffffc}, 0x10) 19:14:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 358.490823][T18508] loop5: detected capacity change from 0 to 8 19:14:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xa, 0x8, 0xfd03, 0x101, 0x0, 0x1}, 0x40) [ 358.546061][T18508] Can't find a SQUASHFS superblock on loop5 19:14:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000140)=@framed={{}, [@generic={0x7a}]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) 19:14:18 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) 19:14:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:14:18 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7801000024000b0d00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000009000100677265640000000048010200380001000002000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004010200a3c819a4af369e2da941d6e24699fa79aea5f2b2773a3ddeb9e93c6e86894ac229448ddbd72f681b8321c736300a31582bbf30ed73c83dc38ef7a16d40de87fffd56f3f7254e658d354958c34b311250bf6644ba071c6cf9a244b07877786cd4bf022b4246a54542183c88026b21fce6d2bbeefdc82a088a4ddb2aeb88781d18b840f475999d429358b914df91f3b64d74622e77d450d6d227b72ba12a803b7975280e19d3dbcfd8f22f935e6fd7f474de7bc549bcbc10dfaa3b36e916a24c8a6565b5a3bb8b2a80f2da43814fcb8294c96482e7c77e0edc19c9346456aff9f837638c2afec936dd6a0a0f2bebef69672bfe0eff4e2b3e3dac6b40259a53dd43080004"], 0x178}}, 0x0) 19:14:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x24048005, &(0x7f00000013c0)=@un=@file={0x0, './file0\x00'}, 0x80) 19:14:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x21, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) [ 358.793107][T18528] loop5: detected capacity change from 0 to 8 19:14:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001640)={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 19:14:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5411, 0x0) [ 358.867708][T18528] Can't find a SQUASHFS superblock on loop5 19:14:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4002, &(0x7f0000000140)=@framed={{}, [@generic]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:14:18 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x3}}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd7, &(0x7f0000000400)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x19, 0x1, &(0x7f00000002c0)=@raw=[@jmp], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:18 executing program 1: r0 = socket(0x2, 0x3, 0x6) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) recvfrom(r0, &(0x7f0000000100)=""/211, 0xd3, 0x62, 0x0, 0x0) 19:14:18 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @broadcast, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "e1d729", 0x18, 0x6, 0x0, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {[], @payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}, 0x0) 19:14:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 359.177910][T18559] loop5: detected capacity change from 0 to 8 19:14:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x0, 0xc9, 0x0, 0x1}, 0x40) 19:14:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001100)=@newtfilter={0xec4, 0x2c, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_route={{0xa}, {0xd10, 0x2, [@TCA_ROUTE4_POLICE={0x81c, 0x5, [@TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x520, 0x101, 0x1, 0x7fff, 0x7ff, 0x0, 0x8, 0x7ea, 0xa0, 0x6, 0x2, 0xaa47, 0x2, 0x101, 0x8, 0x100, 0x10000, 0x1, 0x4d, 0x5, 0xfffff000, 0x4, 0x9, 0x1, 0x5, 0x9, 0x4, 0x9c1, 0x1, 0x7, 0x100, 0x0, 0x200, 0x8, 0xa9b, 0xd8, 0x0, 0x200, 0x1ff, 0x1, 0x8, 0x200, 0xfffffff9, 0x1, 0x2, 0x0, 0xf3b2, 0x3, 0x2, 0x3, 0x299, 0x80000000, 0x200, 0x5, 0x2, 0x58a, 0x3, 0x9, 0x48, 0x0, 0x5, 0x2, 0x2, 0x90c9, 0x50, 0x3f, 0x7, 0x3f, 0xfffffff8, 0x1, 0x5, 0x17f, 0x2e37, 0x1, 0x7, 0x3ff, 0xfffffffa, 0x5, 0x6, 0x1959, 0x6, 0x0, 0x0, 0x6, 0xfffffff9, 0x6, 0x3, 0x2a298ab6, 0x0, 0x7, 0x29, 0xd650, 0x8, 0xff, 0x8, 0x3, 0x0, 0x2a06, 0x8ff, 0x1bea, 0x8, 0x8, 0x7, 0x81, 0xffff, 0x20, 0x7a, 0x9, 0x1, 0x7fff, 0xfffffff7, 0x80000000, 0x401, 0x1, 0xae, 0x4, 0x800, 0x4, 0x8, 0x10001, 0x7]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @TCA_POLICE_AVRATE={0x8}]}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_ACT={0x4d8, 0x6, [@m_mpls={0x58, 0x0, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}]}, {0x21, 0x6, "3548e670af3ff60723bbbcb11a65446d82f7461f7fa6a24bfac9c9dc61"}, {0xc}, {0xc}}}, @m_vlan={0x4c, 0x0, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_ID={0x6}]}, {0xd, 0x6, "8388e3415c2a9d6893"}, {0xc}, {0xc}}}, @m_bpf={0x1a8, 0x0, 0x0, 0x0, {{0x8}, {0x9c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{}, {}, {}, {}]}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0xe5, 0x6, "5be42b1fd57e17aab02624d76ba7e858e2769701c0cbd02285e2daf2bced8c2f362f2e697f7c03d76beda9c1f021d4ef3895c50158b2c8f62f59a80a0b921cf7c109cb822cc46317776261258f5f7d9449775f1d28fd0a1ee9836116c2a3e394e38cf9b8700dcf29b7d011c8a7ab87f7d7467824fc88ddb62089ea8ac28743bd28900d92a419735907c2458b045bbc7d849909d053179fc855704322990a12e8e4615171539f9df92b505bf32e47e861f1dae9ebf9ba91fca3357bdec3c6bc39d5a1eb3cdefae989124086e01073fca50bf507d14d25ea1be06b53cd3f12fd9092"}, {0xc}, {0xc}}}, @m_ctinfo={0x98, 0x0, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18}]}, {0x51, 0x6, "c1d82d75d481e805646c226f7f7ffde7d498b90aeec2c068a0bb2f226da268410001d5fc21acbbbfbfc87c4d12e50117d0eba8cd56a4a4cfdef30e4a62504c559fb708fcf5f2b63d5dde8aa39f"}, {0xc}, {0xc}}}, @m_xt={0x10c, 0x0, 0x0, 0x0, {{0x7}, {0x98, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x91, 0x6, {0x0, 'raw\x00', 0x0, 0x0, "01a20caceddcdfbd7a48a0c729158998c60047066878b48ca4fb098d548320e2907622a09780fb66354148cdcc03173f09c666a28ce9abb9e5eafc2b95e4a29c632b94ff80998657a3768ffc1d372e5371ed26dc4575b93664a342be52daa8e5e948b2bf0db73a"}}]}, {0x4d, 0x6, "a61f4f76ec9aec01282aa408419eb71e125b7722cb258c38c9b4fd983b390b1b733eb1e593d4f58317134e8d78e759aab1fc21f91763a818aaf2e413a5cde7f2718ba84860915c0d2a"}, {0xc}, {0xc}}}, @m_tunnel_key={0xe4, 0x0, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}]}, {0x8d, 0x6, "966e741f9de50a55326c4288e39f8945d30ac43531113d05dae16b23e93801ba4539a292e34a9793b9216ba1116b5a215ad1d4d20daabfd3e82550759f3f98a772c34656c02c4561cbda1721b765b17306ecb8715f415aab140b77c5c3c6549b80fe1fb5cb4686c8a0b177e844134a49612dc2614a5710002dcdd8785f882212a466b5cc34b6050d93"}, {0xc}, {0xc}}}]}, @TCA_ROUTE4_FROM={0x8}]}}, @filter_kind_options=@f_bpf={{0x8}, {0x48, 0x2, [@TCA_BPF_CLASSID={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_FD={0x8}]}}, @filter_kind_options=@f_matchall={{0xd}, {0x124, 0x2, [@TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0xcc, 0x2, [@m_mpls={0xc8, 0x0, 0x0, 0x0, {{0x9}, {0x64, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_PROTO={0x6}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5}]}, {0x39, 0x6, "e43dfe5ca8c8ef0b831bede51ce01bd4ac17d72d2c793366ff7332ced1afb4e2631942b449800de9bb2fdaa0931ee6c014ac9ce070"}, {0xc}, {0xc}}}]}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0x34, 0x2, [@m_skbmod={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0xec4}, 0x1, 0x0, 0x0, 0x851}, 0x4000000) [ 359.224410][T18559] Can't find a SQUASHFS superblock on loop5 19:14:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x8, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:19 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x5452, &(0x7f00000000c0)={'syztnl1\x00', 0x0}) 19:14:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010300)) 19:14:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000000)={'gretap0\x00', 0x0}) 19:14:19 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={0x0, 0x0, 0xda43c80e4bdbae}, 0x10) 19:14:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000040)={'veth0_to_batadv\x00', @ifru_map}) 19:14:19 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x4, &(0x7f00000001c0)=@framed={{}, [@func]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x86, &(0x7f0000000080)=""/134, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000)=0x2, 0x4) [ 359.501921][T18579] loop5: detected capacity change from 0 to 8 19:14:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000040)={'veth0_to_batadv\x00', @ifru_map}) [ 359.570671][T18579] Can't find a SQUASHFS superblock on loop5 19:14:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) 19:14:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x2, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 19:14:19 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000200)={0x70002011}) [ 359.803586][T18597] loop5: detected capacity change from 0 to 8 [ 359.851792][T18597] Can't find a SQUASHFS superblock on loop5 19:14:19 executing program 1: r0 = socket(0x2, 0x3, 0x6) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) 19:14:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) [ 360.137221][T18610] loop5: detected capacity change from 0 to 8 [ 360.171681][T18610] Can't find a SQUASHFS superblock on loop5 19:14:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x1}}}}]}]}, 0x48}}, 0x0) 19:14:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x11, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:20 executing program 4: r0 = socket(0x2, 0x3, 0x6) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) 19:14:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x11}, 0x14}}, 0x0) 19:14:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010300)) 19:14:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8904, &(0x7f0000000000)={'veth0_to_bond\x00', @ifru_hwaddr=@dev}) 19:14:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, 0x0, 0x7) 19:14:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000007340)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) [ 360.384011][T18620] loop5: detected capacity change from 0 to 8 [ 360.419133][T18620] Can't find a SQUASHFS superblock on loop5 19:14:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x178}], 0x0, &(0x7f0000010300)) 19:14:20 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8936, 0x0) 19:14:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000000000)={'veth0_to_bond\x00', @ifru_hwaddr=@dev}) 19:14:20 executing program 2: r0 = epoll_create(0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r2) 19:14:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) 19:14:20 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x40000008}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 19:14:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local}}}}) [ 360.676707][T18639] loop5: detected capacity change from 0 to 8 19:14:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xa, 0x8, 0x14, 0x101, 0x0, 0x1}, 0x40) 19:14:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000b80)={&(0x7f0000000700)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@dstopts={{0x18}}, @hoplimit_2292={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x58}, 0x0) [ 360.774676][T18639] unable to read xattr id index table 19:14:20 executing program 2: r0 = socket(0x2, 0x3, 0x6) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x300, 0x0) 19:14:20 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:14:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x10, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xa, 0x8, 0x4, 0x101, 0x8, 0x1}, 0x40) 19:14:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x178}], 0x0, &(0x7f0000010300)) 19:14:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8953, 0x0) 19:14:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x8, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:20 executing program 2: r0 = socket(0x2, 0x3, 0x6) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x14) 19:14:20 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000400)={@link_local, @link_local, @val={@void, {0x8100, 0x7}}, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "3722b7", 0x10, 0x21, 0x0, @mcast1, @private2, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0596ae", 0x0, "29963c"}}}}}}}, 0x0) 19:14:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001100)=@newtfilter={0xec4, 0x2c, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_route={{0xa}, {0xd10, 0x2, [@TCA_ROUTE4_POLICE={0x81c, 0x5, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @TCA_POLICE_AVRATE={0x8}]}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_ACT={0x4d8, 0x6, [@m_mpls={0x58, 0x0, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}]}, {0x21, 0x6, "3548e670af3ff60723bbbcb11a65446d82f7461f7fa6a24bfac9c9dc61"}, {0xc}, {0xc}}}, @m_vlan={0x4c, 0x0, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_ID={0x6}]}, {0xd, 0x6, "8388e3415c2a9d6893"}, {0xc}, {0xc}}}, @m_bpf={0x1a8, 0x0, 0x0, 0x0, {{0x8}, {0x9c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{}, {}, {}, {}]}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0xe5, 0x6, "5be42b1fd57e17aab02624d76ba7e858e2769701c0cbd02285e2daf2bced8c2f362f2e697f7c03d76beda9c1f021d4ef3895c50158b2c8f62f59a80a0b921cf7c109cb822cc46317776261258f5f7d9449775f1d28fd0a1ee9836116c2a3e394e38cf9b8700dcf29b7d011c8a7ab87f7d7467824fc88ddb62089ea8ac28743bd28900d92a419735907c2458b045bbc7d849909d053179fc855704322990a12e8e4615171539f9df92b505bf32e47e861f1dae9ebf9ba91fca3357bdec3c6bc39d5a1eb3cdefae989124086e01073fca50bf507d14d25ea1be06b53cd3f12fd9092"}, {0xc}, {0xc}}}, @m_ctinfo={0x98, 0x0, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18}]}, {0x51, 0x6, "c1d82d75d481e805646c226f7f7ffde7d498b90aeec2c068a0bb2f226da268410001d5fc21acbbbfbfc87c4d12e50117d0eba8cd56a4a4cfdef30e4a62504c559fb708fcf5f2b63d5dde8aa39f"}, {0xc}, {0xc}}}, @m_xt={0x10c, 0x0, 0x0, 0x0, {{0x7}, {0x98, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x91, 0x6, {0x0, 'raw\x00', 0x0, 0x0, "01a20caceddcdfbd7a48a0c729158998c60047066878b48ca4fb098d548320e2907622a09780fb66354148cdcc03173f09c666a28ce9abb9e5eafc2b95e4a29c632b94ff80998657a3768ffc1d372e5371ed26dc4575b93664a342be52daa8e5e948b2bf0db73a"}}]}, {0x4d, 0x6, "a61f4f76ec9aec01282aa408419eb71e125b7722cb258c38c9b4fd983b390b1b733eb1e593d4f58317134e8d78e759aab1fc21f91763a818aaf2e413a5cde7f2718ba84860915c0d2a"}, {0xc}, {0xc}}}, @m_tunnel_key={0xe4, 0x0, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}]}, {0x8d, 0x6, "966e741f9de50a55326c4288e39f8945d30ac43531113d05dae16b23e93801ba4539a292e34a9793b9216ba1116b5a215ad1d4d20daabfd3e82550759f3f98a772c34656c02c4561cbda1721b765b17306ecb8715f415aab140b77c5c3c6549b80fe1fb5cb4686c8a0b177e844134a49612dc2614a5710002dcdd8785f882212a466b5cc34b6050d93"}, {0xc}, {0xc}}}]}, @TCA_ROUTE4_FROM={0x8}]}}, @filter_kind_options=@f_bpf={{0x8}, {0x48, 0x2, [@TCA_BPF_CLASSID={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_FD={0x8}]}}, @filter_kind_options=@f_matchall={{0xd}, {0x124, 0x2, [@TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0xcc, 0x2, [@m_mpls={0xc8, 0x0, 0x0, 0x0, {{0x9}, {0x64, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_PROTO={0x6}, @TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5}]}, {0x39, 0x6, "e43dfe5ca8c8ef0b831bede51ce01bd4ac17d72d2c793366ff7332ced1afb4e2631942b449800de9bb2fdaa0931ee6c014ac9ce070"}, {0xc}, {0xc}}}]}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_ACT={0x34, 0x2, [@m_skbmod={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0xec4}}, 0x0) [ 361.182999][T18674] loop5: detected capacity change from 0 to 8 19:14:21 executing program 3: sendmsg$RDMA_NLDEV_CMD_DELLINK(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x10, 0x1404, 0x1}, 0x10}}, 0x0) syz_emit_ethernet(0x43b, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd"], 0x0) [ 361.235071][T18674] unable to read xattr id index table 19:14:21 executing program 4: clock_getres(0x2, &(0x7f0000000480)) 19:14:21 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f00000001c0)=[{r0, 0x40}], 0x1, 0x17) 19:14:21 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(r0, 0x0, 0x0) 19:14:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x178}], 0x0, &(0x7f0000010300)) 19:14:21 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f00000001c0)=[{r0, 0x40}], 0x1, 0x0) 19:14:21 executing program 3: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) 19:14:21 executing program 4: pipe(&(0x7f0000000040)) poll(0x0, 0x0, 0x0) 19:14:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2b, &(0x7f0000000000), 0x0) 19:14:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f00000000c0)) [ 361.514200][T18695] loop5: detected capacity change from 0 to 8 19:14:21 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 19:14:21 executing program 2: r0 = getpgrp(0xffffffffffffffff) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x401) [ 361.575005][T18695] unable to read xattr id index table 19:14:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x36) 19:14:21 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) 19:14:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x234}], 0x0, &(0x7f0000010300)) 19:14:21 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 19:14:21 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000), 0x4) 19:14:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000004c0)={0x0, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @private}}}, 0x108) 19:14:21 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) [ 361.841780][T18717] loop5: detected capacity change from 0 to 8 19:14:21 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) 19:14:21 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 19:14:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xd3, &(0x7f0000000000), 0x0) [ 361.929088][T18717] unable to read xattr id index table 19:14:21 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000001b00), 0x301200, 0x0) 19:14:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_buf(r0, 0x29, 0x45, 0x0, &(0x7f0000000180)) 19:14:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x234}], 0x0, &(0x7f0000010300)) 19:14:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2e, &(0x7f0000000000)='H', 0x1) 19:14:21 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x120, 0x0, 0x0) 19:14:21 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 19:14:21 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 19:14:22 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(r0, 0x0, 0x0) [ 362.224476][T18741] loop5: detected capacity change from 0 to 8 19:14:22 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0) 19:14:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2d, 0x0, 0x0) [ 362.367788][T18741] unable to read xattr id index table 19:14:22 executing program 4: timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000200), 0x0) 19:14:22 executing program 1: io_setup(0x0, &(0x7f0000000040)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}) 19:14:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x234}], 0x0, &(0x7f0000010300)) 19:14:22 executing program 1: timer_create(0x0, 0x0, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000200), 0x0) 19:14:22 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e) 19:14:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f00000000c0)=""/166, &(0x7f0000000180)=0xa6) [ 362.683875][T18767] loop5: detected capacity change from 0 to 8 [ 362.736051][T18767] unable to read xattr id index table 19:14:22 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x10) 19:14:22 executing program 4: r0 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000040), &(0x7f0000000080)=0x4) 19:14:22 executing program 1: getpgid(0x0) timer_create(0x4, &(0x7f0000000080)={0x0, 0x13}, &(0x7f0000000280)) 19:14:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000080), 0x4) 19:14:22 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) 19:14:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x292}], 0x0, &(0x7f0000010300)) 19:14:23 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, 0x0, 0xffffffffffffff8e) 19:14:23 executing program 2: timer_create(0x2, &(0x7f0000000180)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000001c0)) [ 363.256675][T18786] loop5: detected capacity change from 0 to 8 19:14:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000), 0x4) 19:14:23 executing program 3: timer_create(0x1, 0x0, &(0x7f00000001c0)) 19:14:23 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) recvmsg(r0, 0x0, 0x0) [ 363.321449][T18786] unable to read xattr id index table 19:14:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) bind(r0, 0x0, 0x0) 19:14:23 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x452001, 0x0) 19:14:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x292}], 0x0, &(0x7f0000010300)) 19:14:23 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0xd04b820c4e8192d5, 0x0) 19:14:23 executing program 4: capset(&(0x7f0000000180)={0x19980330}, &(0x7f00000001c0)) 19:14:23 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x1cb040, 0x0) 19:14:23 executing program 0: r0 = msgget(0x2, 0x20a) msgctl$IPC_RMID(r0, 0x0) [ 363.618709][T18806] loop5: detected capacity change from 0 to 8 19:14:23 executing program 2: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7ff}, 0x0) [ 363.707752][T18806] unable to read xattr id index table [ 363.733749][T18815] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 19:14:23 executing program 1: getrandom(&(0x7f0000000000)=""/45, 0x2d, 0x0) 19:14:23 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x210ac2, 0x0) 19:14:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0xe902c700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) renameat(r2, &(0x7f0000000100)='.\x00', r1, &(0x7f0000000200)='./file0\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) 19:14:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x292}], 0x0, &(0x7f0000010300)) 19:14:23 executing program 0: sysinfo(&(0x7f0000001000)=""/9) 19:14:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 19:14:23 executing program 3: clone(0x880080, 0x0, 0x0, 0x0, 0x0) 19:14:23 executing program 1: setresuid(0xee01, 0x0, 0xee01) 19:14:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) getpeername(r0, 0x0, 0x0) [ 363.984463][T18830] loop5: detected capacity change from 0 to 8 19:14:23 executing program 4: pselect6(0x0, 0x0, 0x0, &(0x7f0000007e40), &(0x7f0000007e80), &(0x7f0000007f00)={&(0x7f0000007ec0), 0x8}) [ 364.085046][T18830] unable to read xattr id index table 19:14:23 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2c3, 0x0) 19:14:23 executing program 1: pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) 19:14:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f020000000000002880000006007861747472310600000078617474723100000600786174747232", 0x2c1}], 0x0, &(0x7f0000010300)) 19:14:24 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000180), 0x8) 19:14:24 executing program 4: pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x8000}, &(0x7f0000000280)={0x77359400}, 0x0) 19:14:24 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/131) 19:14:24 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x632000, 0x0) 19:14:24 executing program 3: capset(&(0x7f0000000180)={0x19980330}, 0x0) 19:14:24 executing program 0: r0 = getpid() ptrace(0x4207, r0) [ 364.392111][T18855] loop5: detected capacity change from 0 to 8 19:14:24 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x509801, 0x0) [ 364.465592][T18855] unable to read xattr id index table 19:14:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x220d00, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x0) 19:14:24 executing program 2: getcwd(&(0x7f0000000000)=""/225, 0xe1) 19:14:24 executing program 1: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3}, 0x0, 0x0) 19:14:24 executing program 3: select(0x40, &(0x7f0000000000)={0x3}, &(0x7f0000000040)={0x3}, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}) 19:14:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2c1}], 0x0, &(0x7f0000010300)) 19:14:24 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0xe) 19:14:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r1, &(0x7f00000000c0), 0xffffffff, 0x0) 19:14:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000013c0)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001000018000000c2", 0x61, 0x400}], 0x8000, &(0x7f0000000100)) 19:14:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() tgkill(r1, r1, 0x0) 19:14:24 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000007e80), &(0x7f0000007f00)={&(0x7f0000007ec0), 0x8}) [ 364.783682][T18882] loop5: detected capacity change from 0 to 8 19:14:24 executing program 0: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r1, 0xfffffffffffffffe, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 19:14:24 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, 0x0, 0x0) [ 364.862244][T18882] unable to read xattr id index table 19:14:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f00001d8000/0x3000)=nil, 0x3000, 0x1000, 0x2, &(0x7f0000427000/0x1000)=nil) 19:14:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x6) 19:14:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2c1}], 0x0, &(0x7f0000010300)) 19:14:24 executing program 0: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) shmctl$IPC_RMID(r0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) 19:14:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) [ 365.117964][T18916] loop5: detected capacity change from 0 to 8 [ 365.171244][T18916] unable to read xattr id index table 19:14:25 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0xe) 19:14:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:25 executing program 1: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000240)={'trans=tcp,', {'port', 0x3d, 0x300000000000000}, 0x2c, {[{@version_L}], [], 0x22}}) 19:14:25 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semop(r0, &(0x7f00000000c0)=[{}], 0x1) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x8}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 19:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2d8}], 0x0, &(0x7f0000010300)) [ 365.733488][T18940] loop5: detected capacity change from 0 to 8 [ 365.743585][T18937] 9pnet: p9_fd_create_tcp (18937): problem connecting socket to 127.0.0.1 [ 365.768983][T18944] 9pnet: p9_fd_create_tcp (18944): problem connecting socket to 127.0.0.1 19:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2d8}], 0x0, &(0x7f0000010300)) [ 365.806331][T18940] unable to read xattr id index table [ 365.806873][T18947] [ 365.814220][T18947] ===================================================== [ 365.821134][T18947] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 365.828579][T18947] 5.14.0-rc2-syzkaller #0 Not tainted [ 365.833940][T18947] ----------------------------------------------------- [ 365.840856][T18947] syz-executor.2/18947 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 365.848916][T18947] ffff888035ce9be8 (&new->fa_lock){.+.+}-{2:2}, at: kill_fasync+0x132/0x460 [ 365.857638][T18947] [ 365.857638][T18947] and this task is already holding: [ 365.864991][T18947] ffff888147687148 (&timer->lock){..-.}-{2:2}, at: snd_timer_start1+0x5a/0x800 [ 365.873972][T18947] which would create a new lock dependency: [ 365.879853][T18947] (&timer->lock){..-.}-{2:2} -> (&new->fa_lock){.+.+}-{2:2} [ 365.887428][T18947] [ 365.887428][T18947] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 365.896958][T18947] (&timer->lock){..-.}-{2:2} [ 365.896986][T18947] 19:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2d8}], 0x0, &(0x7f0000010300)) [ 365.896986][T18947] ... which became SOFTIRQ-irq-safe at: [ 365.909523][T18947] lock_acquire+0x1ab/0x510 [ 365.914123][T18947] _raw_spin_lock_irqsave+0x39/0x50 [ 365.919418][T18947] snd_timer_notify+0x10c/0x3d0 [ 365.924363][T18947] snd_pcm_post_stop+0x195/0x1f0 [ 365.929382][T18947] snd_pcm_drain_done+0xdc/0x120 [ 365.934408][T18947] snd_pcm_update_state+0x43b/0x540 [ 365.939696][T18947] snd_pcm_update_hw_ptr0+0xa75/0x1a50 [ 365.945246][T18947] snd_pcm_period_elapsed_under_stream_lock+0x15a/0x230 19:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) [ 365.952282][T18947] snd_pcm_period_elapsed+0x28/0x50 [ 365.957573][T18947] dummy_hrtimer_callback+0x94/0x1b0 [ 365.962947][T18947] __hrtimer_run_queues+0x609/0xe50 [ 365.968237][T18947] hrtimer_run_softirq+0x17b/0x360 [ 365.973720][T18947] __do_softirq+0x29b/0x9c2 [ 365.978311][T18947] __irq_exit_rcu+0x16e/0x1c0 [ 365.983078][T18947] irq_exit_rcu+0x5/0x20 [ 365.987413][T18947] sysvec_apic_timer_interrupt+0x93/0xc0 [ 365.993181][T18947] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 365.999422][T18947] lock_acquire+0x1ef/0x510 19:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) [ 366.004529][T18947] blk_queue_enter+0xe5/0xb60 [ 366.009379][T18947] submit_bio_noacct+0xa84/0xf20 [ 366.014399][T18947] submit_bio+0x1ea/0x470 [ 366.019074][T18947] submit_bh_wbc+0x5eb/0x7f0 [ 366.023763][T18947] ext4_read_bh+0x152/0x300 [ 366.028616][T18947] ext4_read_bh_lock+0x82/0x180 [ 366.033552][T18947] __ext4_sb_bread_gfp.isra.0+0xf3/0x1b0 [ 366.039359][T18947] ext4_fill_super+0x233d/0xe3f0 [ 366.044464][T18947] mount_bdev+0x34d/0x410 [ 366.048880][T18947] legacy_get_tree+0x105/0x220 19:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e4}], 0x0, &(0x7f0000010300)) [ 366.054166][T18947] vfs_get_tree+0x89/0x2f0 [ 366.059013][T18947] path_mount+0x132a/0x1fa0 [ 366.063776][T18947] __x64_sys_mount+0x27f/0x300 [ 366.068625][T18947] do_syscall_64+0x35/0xb0 [ 366.073131][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 366.079196][T18947] [ 366.079196][T18947] to a SOFTIRQ-irq-unsafe lock: [ 366.086287][T18947] (&new->fa_lock){.+.+}-{2:2} [ 366.086313][T18947] [ 366.086313][T18947] ... which became SOFTIRQ-irq-unsafe at: [ 366.098920][T18947] ... [ 366.098927][T18947] lock_acquire+0x1ab/0x510 [ 366.106082][T18947] _raw_read_lock+0x5b/0x70 [ 366.110682][T18947] kill_fasync+0x132/0x460 [ 366.115188][T18947] fsnotify_add_event+0x3ba/0x500 [ 366.120581][T18947] inotify_handle_inode_event+0x31b/0x5c0 [ 366.126482][T18947] fsnotify_handle_inode_event.isra.0+0x1b8/0x270 [ 366.132982][T18947] fsnotify+0xc27/0x1050 [ 366.137309][T18947] do_sys_openat2+0x3a3/0x420 [ 366.142074][T18947] __x64_sys_open+0x119/0x1c0 [ 366.146844][T18947] do_syscall_64+0x35/0xb0 [ 366.151346][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 366.157323][T18947] [ 366.157323][T18947] other info that might help us debug this: [ 366.157323][T18947] [ 366.167538][T18947] Possible interrupt unsafe locking scenario: [ 366.167538][T18947] [ 366.175835][T18947] CPU0 CPU1 [ 366.181352][T18947] ---- ---- [ 366.186867][T18947] lock(&new->fa_lock); [ 366.191091][T18947] local_irq_disable(); [ 366.197916][T18947] lock(&timer->lock); [ 366.204767][T18947] lock(&new->fa_lock); [ 366.211510][T18947] [ 366.214943][T18947] lock(&timer->lock); [ 366.219426][T18947] [ 366.219426][T18947] *** DEADLOCK *** [ 366.219426][T18947] [ 366.227547][T18947] 3 locks held by syz-executor.2/18947: [ 366.233069][T18947] #0: ffff888017a0ad68 (&tu->ioctl_lock){+.+.}-{3:3}, at: snd_timer_user_ioctl+0x4c/0xb0 [ 366.243078][T18947] #1: ffff888147687148 (&timer->lock){..-.}-{2:2}, at: snd_timer_start1+0x5a/0x800 [ 366.252473][T18947] #2: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x3d/0x460 [ 366.261512][T18947] [ 366.261512][T18947] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 366.271980][T18947] -> (&timer->lock){..-.}-{2:2} { [ 366.277000][T18947] IN-SOFTIRQ-W at: [ 366.280959][T18947] lock_acquire+0x1ab/0x510 [ 366.287275][T18947] _raw_spin_lock_irqsave+0x39/0x50 [ 366.294118][T18947] snd_timer_notify+0x10c/0x3d0 [ 366.300606][T18947] snd_pcm_post_stop+0x195/0x1f0 [ 366.307180][T18947] snd_pcm_drain_done+0xdc/0x120 [ 366.313855][T18947] snd_pcm_update_state+0x43b/0x540 [ 366.320717][T18947] snd_pcm_update_hw_ptr0+0xa75/0x1a50 [ 366.327826][T18947] snd_pcm_period_elapsed_under_stream_lock+0x15a/0x230 [ 366.336492][T18947] snd_pcm_period_elapsed+0x28/0x50 [ 366.343429][T18947] dummy_hrtimer_callback+0x94/0x1b0 [ 366.350436][T18947] __hrtimer_run_queues+0x609/0xe50 [ 366.357655][T18947] hrtimer_run_softirq+0x17b/0x360 [ 366.364405][T18947] __do_softirq+0x29b/0x9c2 [ 366.370546][T18947] __irq_exit_rcu+0x16e/0x1c0 [ 366.376863][T18947] irq_exit_rcu+0x5/0x20 [ 366.382739][T18947] sysvec_apic_timer_interrupt+0x93/0xc0 [ 366.390011][T18947] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 366.397715][T18947] lock_acquire+0x1ef/0x510 [ 366.403850][T18947] blk_queue_enter+0xe5/0xb60 [ 366.410177][T18947] submit_bio_noacct+0xa84/0xf20 [ 366.416959][T18947] submit_bio+0x1ea/0x470 [ 366.422923][T18947] submit_bh_wbc+0x5eb/0x7f0 [ 366.429152][T18947] ext4_read_bh+0x152/0x300 [ 366.435296][T18947] ext4_read_bh_lock+0x82/0x180 [ 366.441789][T18947] __ext4_sb_bread_gfp.isra.0+0xf3/0x1b0 [ 366.449157][T18947] ext4_fill_super+0x233d/0xe3f0 [ 366.455904][T18947] mount_bdev+0x34d/0x410 [ 366.461869][T18947] legacy_get_tree+0x105/0x220 [ 366.468528][T18947] vfs_get_tree+0x89/0x2f0 [ 366.474579][T18947] path_mount+0x132a/0x1fa0 [ 366.480716][T18947] __x64_sys_mount+0x27f/0x300 [ 366.487749][T18947] do_syscall_64+0x35/0xb0 [ 366.494086][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 366.501704][T18947] INITIAL USE at: [ 366.505667][T18947] lock_acquire+0x1ab/0x510 [ 366.511720][T18947] _raw_spin_lock_irqsave+0x39/0x50 [ 366.518470][T18947] snd_timer_notify+0x10c/0x3d0 [ 366.524872][T18947] snd_pcm_post_stop+0x195/0x1f0 [ 366.531355][T18947] snd_pcm_action+0x143/0x170 [ 366.537581][T18947] snd_pcm_drop+0x1ab/0x320 [ 366.543630][T18947] snd_pcm_kernel_ioctl+0x12f/0x240 [ 366.550378][T18947] snd_pcm_oss_sync+0x230/0x800 [ 366.556778][T18947] snd_pcm_oss_release+0x276/0x300 [ 366.563441][T18947] __fput+0x288/0x920 [ 366.568971][T18947] task_work_run+0xdd/0x1a0 [ 366.575119][T18947] exit_to_user_mode_prepare+0x27e/0x290 [ 366.582305][T18947] syscall_exit_to_user_mode+0x19/0x60 [ 366.589314][T18947] do_syscall_64+0x42/0xb0 [ 366.595277][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 366.602716][T18947] } [ 366.605194][T18947] ... key at: [] __key.12+0x0/0x40 [ 366.612473][T18947] [ 366.612473][T18947] the dependencies between the lock to be acquired [ 366.612481][T18947] and SOFTIRQ-irq-unsafe lock: [ 366.626043][T18947] -> (&new->fa_lock){.+.+}-{2:2} { [ 366.631158][T18947] HARDIRQ-ON-R at: [ 366.635116][T18947] lock_acquire+0x1ab/0x510 [ 366.641254][T18947] _raw_read_lock+0x5b/0x70 [ 366.647396][T18947] kill_fasync+0x132/0x460 [ 366.653448][T18947] fsnotify_add_event+0x3ba/0x500 [ 366.660110][T18947] inotify_handle_inode_event+0x31b/0x5c0 [ 366.667462][T18947] fsnotify_handle_inode_event.isra.0+0x1b8/0x270 [ 366.675598][T18947] fsnotify+0xc27/0x1050 [ 366.681472][T18947] do_sys_openat2+0x3a3/0x420 [ 366.687787][T18947] __x64_sys_open+0x119/0x1c0 [ 366.694102][T18947] do_syscall_64+0x35/0xb0 [ 366.700243][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 366.707879][T18947] SOFTIRQ-ON-R at: [ 366.711841][T18947] lock_acquire+0x1ab/0x510 [ 366.717977][T18947] _raw_read_lock+0x5b/0x70 [ 366.724121][T18947] kill_fasync+0x132/0x460 [ 366.730174][T18947] fsnotify_add_event+0x3ba/0x500 [ 366.736836][T18947] inotify_handle_inode_event+0x31b/0x5c0 [ 366.744191][T18947] fsnotify_handle_inode_event.isra.0+0x1b8/0x270 [ 366.752240][T18947] fsnotify+0xc27/0x1050 [ 366.758116][T18947] do_sys_openat2+0x3a3/0x420 [ 366.764431][T18947] __x64_sys_open+0x119/0x1c0 [ 366.770831][T18947] do_syscall_64+0x35/0xb0 [ 366.776886][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 366.784414][T18947] INITIAL USE at: [ 366.788317][T18947] lock_acquire+0x1ab/0x510 [ 366.794367][T18947] _raw_write_lock_irq+0x32/0x50 [ 366.801222][T18947] fasync_remove_entry+0xb6/0x1f0 [ 366.808079][T18947] fasync_helper+0x9e/0xb0 [ 366.814222][T18947] sock_fasync+0x94/0x140 [ 366.820104][T18947] __fput+0x712/0x920 [ 366.825634][T18947] task_work_run+0xdd/0x1a0 [ 366.831771][T18947] exit_to_user_mode_prepare+0x27e/0x290 [ 366.838958][T18947] syscall_exit_to_user_mode+0x19/0x60 [ 366.846141][T18947] do_syscall_64+0x42/0xb0 [ 366.852109][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 366.859548][T18947] INITIAL READ USE at: [ 366.863855][T18947] lock_acquire+0x1ab/0x510 [ 366.870338][T18947] _raw_read_lock+0x5b/0x70 [ 366.876825][T18947] kill_fasync+0x132/0x460 [ 366.883311][T18947] fsnotify_add_event+0x3ba/0x500 [ 366.890316][T18947] inotify_handle_inode_event+0x31b/0x5c0 [ 366.898034][T18947] fsnotify_handle_inode_event.isra.0+0x1b8/0x270 [ 366.906443][T18947] fsnotify+0xc27/0x1050 [ 366.912688][T18947] do_sys_openat2+0x3a3/0x420 [ 366.919349][T18947] __x64_sys_open+0x119/0x1c0 [ 366.926011][T18947] do_syscall_64+0x35/0xb0 [ 366.932423][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 366.940295][T18947] } [ 366.942773][T18947] ... key at: [] __key.0+0x0/0x40 [ 366.949870][T18947] ... acquired at: [ 366.953650][T18947] lock_acquire+0x1ab/0x510 [ 366.958310][T18947] _raw_read_lock+0x5b/0x70 [ 366.962976][T18947] kill_fasync+0x132/0x460 [ 366.967550][T18947] snd_timer_user_ccallback+0x298/0x330 [ 366.973262][T18947] snd_timer_notify1+0x11c/0x3b0 [ 366.978364][T18947] snd_timer_start1+0x4d4/0x800 [ 366.983377][T18947] snd_timer_user_start.isra.0+0x1e3/0x260 [ 366.989342][T18947] __snd_timer_user_ioctl.isra.0+0xda8/0x24c0 [ 366.995571][T18947] snd_timer_user_ioctl+0x77/0xb0 [ 367.000755][T18947] __x64_sys_ioctl+0x193/0x200 [ 367.005682][T18947] do_syscall_64+0x35/0xb0 [ 367.010373][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 367.016508][T18947] [ 367.018986][T18947] [ 367.018986][T18947] stack backtrace: [ 367.024851][T18947] CPU: 0 PID: 18947 Comm: syz-executor.2 Not tainted 5.14.0-rc2-syzkaller #0 [ 367.033592][T18947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.043630][T18947] Call Trace: [ 367.046900][T18947] dump_stack_lvl+0xcd/0x134 [ 367.051482][T18947] check_irq_usage.cold+0x4c1/0x6b0 [ 367.056669][T18947] ? print_shortest_lock_dependencies_backwards+0x80/0x80 [ 367.063940][T18947] ? create_prof_cpu_mask+0x20/0x20 [ 367.069123][T18947] ? check_path.constprop.0+0x24/0x50 [ 367.074479][T18947] ? register_lock_class+0xb7/0x10c0 [ 367.080032][T18947] ? stack_trace_save+0x8c/0xc0 [ 367.084871][T18947] ? stack_trace_consume_entry+0x160/0x160 [ 367.090667][T18947] ? lockdep_lock+0xc6/0x200 [ 367.095257][T18947] ? call_rcu_zapped+0xb0/0xb0 [ 367.100011][T18947] ? _find_first_zero_bit+0x94/0xb0 [ 367.105211][T18947] __lock_acquire+0x2a1f/0x54a0 [ 367.110052][T18947] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 367.116023][T18947] lock_acquire+0x1ab/0x510 [ 367.120513][T18947] ? kill_fasync+0x132/0x460 [ 367.125090][T18947] ? lock_release+0x720/0x720 [ 367.129756][T18947] ? lock_release+0x720/0x720 [ 367.134504][T18947] ? snd_timer_user_ccallback+0x281/0x330 [ 367.140213][T18947] ? lock_downgrade+0x6e0/0x6e0 [ 367.145050][T18947] _raw_read_lock+0x5b/0x70 [ 367.149544][T18947] ? kill_fasync+0x132/0x460 [ 367.154121][T18947] kill_fasync+0x132/0x460 [ 367.158523][T18947] snd_timer_user_ccallback+0x298/0x330 [ 367.164057][T18947] ? snd_timer_user_append_to_tqueue+0x220/0x220 [ 367.170378][T18947] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 367.176604][T18947] ? ktime_get_ts64+0x3bb/0x560 [ 367.181439][T18947] snd_timer_notify1+0x11c/0x3b0 [ 367.186364][T18947] ? snd_timer_user_append_to_tqueue+0x220/0x220 [ 367.192682][T18947] ? rwlock_bug.part.0+0x90/0x90 [ 367.197606][T18947] ? timer_set_gparams+0x160/0x160 [ 367.202834][T18947] ? _raw_spin_lock_irqsave+0x4e/0x50 [ 367.208223][T18947] snd_timer_start1+0x4d4/0x800 [ 367.213067][T18947] snd_timer_user_start.isra.0+0x1e3/0x260 [ 367.218869][T18947] __snd_timer_user_ioctl.isra.0+0xda8/0x24c0 [ 367.224932][T18947] ? snd_timer_user_params.isra.0+0x8c0/0x8c0 [ 367.231167][T18947] ? lock_release+0x720/0x720 [ 367.236094][T18947] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 367.241991][T18947] ? __mutex_lock+0x5bf/0x10a0 [ 367.246742][T18947] ? snd_timer_user_ioctl+0x4c/0xb0 [ 367.251929][T18947] ? lock_downgrade+0x6e0/0x6e0 [ 367.256766][T18947] ? mutex_lock_io_nested+0xf00/0xf00 [ 367.262129][T18947] ? __fget_files+0x23d/0x3e0 [ 367.266795][T18947] snd_timer_user_ioctl+0x77/0xb0 [ 367.271988][T18947] ? __snd_timer_user_ioctl.isra.0+0x24c0/0x24c0 [ 367.278312][T18947] __x64_sys_ioctl+0x193/0x200 [ 367.283066][T18947] do_syscall_64+0x35/0xb0 [ 367.287480][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 367.293369][T18947] RIP: 0033:0x4665e9 [ 367.297244][T18947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 367.317134][T18947] RSP: 002b:00007f50d63a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 367.325539][T18947] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665e9 [ 367.333498][T18947] RDX: 0000000000000000 RSI: 00000000000054a0 RDI: 0000000000000003 [ 367.341527][T18947] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 367.349750][T18947] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038 19:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ea}], 0x0, &(0x7f0000010300)) 19:14:27 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0xe) [ 367.357879][T18947] R13: 00007ffd6816afff R14: 00007f50d63a9300 R15: 0000000000022000 [ 367.426759][T18963] loop5: detected capacity change from 0 to 8 19:14:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:27 executing program 1: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f00000000c0)=[{}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x10) 19:14:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x101182) 19:14:27 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ea}], 0x0, &(0x7f0000010300)) [ 367.505674][T18963] unable to read xattr id index table 19:14:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) [ 367.591746][T18978] loop5: detected capacity change from 0 to 8 [ 367.629559][T18978] unable to read xattr id index table 19:14:27 executing program 2: msgrcv(0x0, &(0x7f0000000140)={0x0, ""/169}, 0xb1, 0x0, 0x800) 19:14:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ea}], 0x0, &(0x7f0000010300)) 19:14:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 19:14:27 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 367.726912][T18994] loop5: detected capacity change from 0 to 8 [ 367.756254][T18994] unable to read xattr id index table 19:14:28 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0xe) 19:14:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) 19:14:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000", 0x2ed}], 0x0, &(0x7f0000010300)) 19:14:28 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x200000000000004, 0x0) [ 368.403696][T19013] loop5: detected capacity change from 0 to 8 [ 368.425209][T19013] unable to read xattr id index table 19:14:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ed}], 0x0, &(0x7f0000010300)) 19:14:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:28 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:28 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee01) r3 = fork() tgkill(r3, r3, 0x0) [ 368.577870][T19034] loop5: detected capacity change from 0 to 8 [ 368.593320][T19034] unable to read xattr id index table 19:14:29 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semctl$IPC_RMID(r0, 0x0, 0xe) 19:14:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ed}], 0x0, &(0x7f0000010300)) 19:14:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) 19:14:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) 19:14:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x1014814, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fff) 19:14:29 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:29 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semctl$IPC_RMID(r0, 0x0, 0xe) 19:14:29 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 369.313979][T19057] loop5: detected capacity change from 0 to 8 19:14:29 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semctl$IPC_RMID(r0, 0x0, 0xe) [ 369.361739][T19057] unable to read xattr id index table 19:14:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ee}], 0x0, &(0x7f0000010300)) 19:14:29 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:29 executing program 4: semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 19:14:29 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 369.525931][T19076] loop5: detected capacity change from 0 to 8 [ 369.566156][T19076] unable to read xattr id index table 19:14:29 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 369.683411][ T37] audit: type=1800 audit(1627154069.454:101): pid=19062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="cgroup.controllers" dev="sda1" ino=15341 res=0 errno=0 19:14:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) 19:14:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ee}], 0x0, &(0x7f0000010300)) 19:14:29 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:29 executing program 2: prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pipe(0x0) 19:14:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) 19:14:29 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 19:14:29 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_setup(0x0, &(0x7f0000000040)) [ 370.155567][T19094] loop5: detected capacity change from 0 to 8 [ 370.184484][T19094] unable to read xattr id index table 19:14:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ee}], 0x0, &(0x7f0000010300)) 19:14:30 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) [ 370.287054][T19112] loop5: detected capacity change from 0 to 8 [ 370.312215][T19112] unable to read xattr id index table 19:14:30 executing program 4: semtimedop(0x0, 0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 19:14:30 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee01) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) semget$private(0x0, 0x8, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 19:14:30 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 19:14:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) 19:14:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000006001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a1020000000000000100000000000000cb02", 0x2ef}], 0x0, 0x0) 19:14:30 executing program 2: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 19:14:30 executing program 4: semtimedop(0x0, 0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 19:14:30 executing program 0: r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) 19:14:30 executing program 4: semtimedop(0x0, 0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 19:14:30 executing program 2: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semop(r0, &(0x7f00000000c0)=[{}], 0x1) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:30 executing program 0: r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 371.074476][T19138] loop5: detected capacity change from 0 to 8 19:14:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, 0x0) 19:14:30 executing program 0: r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:30 executing program 4: semtimedop(0x0, &(0x7f0000000080), 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) [ 371.256575][T19156] loop5: detected capacity change from 0 to 8 19:14:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) fcntl$setstatus(r0, 0x4, 0x2800) 19:14:31 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:31 executing program 4: semtimedop(0x0, &(0x7f0000000080), 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 19:14:31 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) 19:14:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x72d78dd094c7db66, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2ef}], 0x0, 0x0) 19:14:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:31 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:31 executing program 2: io_setup(0x0, 0x0) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x6) [ 371.961930][T19172] loop5: detected capacity change from 0 to 8 19:14:31 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file1\x00') fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xee00, 0x0) 19:14:31 executing program 4: semtimedop(0x0, &(0x7f0000000080), 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 19:14:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setstatus(r0, 0x4, 0x2800) 19:14:31 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000000)="020181ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 19:14:31 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) 19:14:31 executing program 4: semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 19:14:31 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, 0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) [ 372.187183][T19194] loop5: detected capacity change from 0 to 1 [ 372.229138][T19194] loop5: p1 p2 p3 p4 [ 372.234630][T19194] loop5: partition table partially beyond EOD, truncated [ 372.264391][T19194] loop5: p1 start 10 is beyond EOD, truncated [ 372.278482][T19194] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 372.296158][T19194] loop5: p3 start 225 is beyond EOD, truncated [ 372.311561][T19194] loop5: p4 size 3657465856 extends beyond EOD, truncated 19:14:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:32 executing program 4: semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 19:14:32 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, 0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) 19:14:32 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000000)="020181ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 19:14:32 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file1\x00') fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xee00, 0x0) 19:14:32 executing program 4: semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xe) 19:14:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setstatus(r0, 0x4, 0x2800) [ 372.852213][T19225] loop5: detected capacity change from 0 to 1 19:14:32 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, 0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:32 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file1\x00') fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xee00, 0x0) 19:14:32 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000), 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 372.926121][T19225] loop5: p1 p2 p3 p4 [ 372.930416][T19225] loop5: partition table partially beyond EOD, truncated [ 372.962831][T19225] loop5: p1 start 10 is beyond EOD, truncated 19:14:32 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setstatus(r0, 0x4, 0x2800) [ 372.994123][T19225] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 373.044058][T19225] loop5: p3 start 225 is beyond EOD, truncated [ 373.061330][T19225] loop5: p4 size 3657465856 extends beyond EOD, truncated 19:14:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:33 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000), 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:33 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) 19:14:33 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000000)="020181ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 19:14:33 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file1\x00') fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xee00, 0x0) 19:14:33 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file1\x00') fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xee00, 0x0) 19:14:33 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) 19:14:33 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000), 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 373.780916][T19274] loop5: detected capacity change from 0 to 1 19:14:33 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) [ 373.834218][T19274] loop5: p1 p2 p3 p4 [ 373.840682][T19274] loop5: partition table partially beyond EOD, truncated [ 373.861245][T19274] loop5: p1 start 10 is beyond EOD, truncated [ 373.878602][T19274] loop5: p2 size 1073872896 extends beyond EOD, truncated 19:14:33 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:33 executing program 3: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) [ 373.910646][T19274] loop5: p3 start 225 is beyond EOD, truncated [ 373.928653][T19274] loop5: p4 size 3657465856 extends beyond EOD, truncated 19:14:33 executing program 3: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) 19:14:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:34 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:34 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000000)="020181ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 19:14:34 executing program 3: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) 19:14:34 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x80000001, "ed105400000000003ec13e2000"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6d706f6c3d717265e665723d94656c617469766578c53a302d353a4e2f4e8b"]) 19:14:34 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file1\x00') fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xee00, 0x0) 19:14:34 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:34 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setstatus(r0, 0x4, 0x0) [ 374.682608][T19312] loop5: detected capacity change from 0 to 1 [ 374.705276][T19314] tmpfs: Bad value for 'mpol' 19:14:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000400)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f404000000655f0100ffff53ef6a623f9165e7581fb4c1411f446994baad4e12d9d8baa8a18c9e467398ea6e24d5c49a41b431bc638ff19c07", 0x66, 0x400}], 0x0, &(0x7f00000003c0)) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 19:14:34 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setstatus(r0, 0x4, 0x0) [ 374.744450][T19312] loop5: p1 p2 p3 p4 [ 374.750782][T19312] loop5: partition table partially beyond EOD, truncated 19:14:34 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 374.794936][T19312] loop5: p1 start 10 is beyond EOD, truncated [ 374.821276][T19312] loop5: p2 size 1073872896 extends beyond EOD, truncated 19:14:34 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 374.842326][T19331] loop4: detected capacity change from 0 to 4 [ 374.850683][T19312] loop5: p3 start 225 is beyond EOD, truncated [ 374.866935][T19312] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 374.889291][T19331] EXT4-fs warning (device loop4): ext4_fill_super:4105: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 374.941441][T19331] EXT4-fs (loop4): VFS: Found ext4 filesystem with unknown checksum algorithm. 19:14:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:14:35 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setstatus(r0, 0x4, 0x0) 19:14:35 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 19:14:35 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000400)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f404000000655f0100ffff53ef6a623f9165e7581fb4c1411f446994baad4e12d9d8baa8a18c9e467398ea6e24d5c49a41b431bc638ff19c07", 0x66, 0x400}], 0x0, &(0x7f00000003c0)) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 19:14:35 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file1\x00') [ 375.589276][T19356] loop4: detected capacity change from 0 to 4 19:14:35 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xffff633d}) 19:14:35 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x40}], 0x1, 0x0) semtimedop(r0, 0x0, 0x0, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:14:35 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 19:14:35 executing program 4: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) io_submit(0x0, 0x0, 0x0) [ 375.627439][T19356] EXT4-fs warning (device loop4): ext4_fill_super:4105: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 375.656465][T19356] EXT4-fs (loop4): VFS: Found ext4 filesystem with unknown checksum algorithm. 19:14:35 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 19:14:35 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@rthdrdstopts={{0x18}}], 0x18}}], 0x1, 0x0)